General

  • Target

    4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd

  • Size

    71KB

  • MD5

    452b958409107844d8fe1b496c416d8f

  • SHA1

    50efa623d974730f4163b4d30b649afce16b2b72

  • SHA256

    4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd

  • SHA512

    2f6ca6d121bedda9435981fcd3290871ed197516499412ca9579b088358bf8d0200b73b236cdc8a3ff2780c3191370308ccdce4dcd8cec11c4c61c920c958b3d

  • SSDEEP

    1536:Pp53FL0Ecmm1IWM0yBNwWEUrK7QHxIaHdLrdB4ohmZ+LVO049unnuY:Pp9FpcmmIWMZvwZU9HxP9L5JhmQLVO0d

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4a58dde2932cb765d63347223f6b0070adabec399301a2ca7df584c3be4fb1cd
    .elf linux x86