General

  • Target

    4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b

  • Size

    54KB

  • MD5

    55529bfe1f1b0fd5d8dd7c207da9a517

  • SHA1

    357cbb2afd27c392c2af823e7ef11da188cfdf29

  • SHA256

    4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b

  • SHA512

    913a42efeb9c256f8c84a511feab16efbc8ed26210baf0ac4a5a1af4a71d862c308f3b5e268097ef75d728c81865267e5549a352d41520d9118e2b2dafb5eeff

  • SSDEEP

    1536:YCYPkwAMnwWvgejy3mDvM/s/QU2hWDdJd/:YCDwZ9oee3mDEgD2hm

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4a14b538e551d4af2045ebebdeaccc53537f832faaedaf361a3c4de13a057f6b
    .elf linux x86