General

  • Target

    4a00adde88030551ffa2020495ff4d1c486a9907d1b0a4e0ff7bdbd88d8c3412

  • Size

    70KB

  • MD5

    0e39e0afddd103d7fbcd5a2773c81b75

  • SHA1

    dc0d9b5f8d72b81ed4b448a913bc6e9e48c30df8

  • SHA256

    4a00adde88030551ffa2020495ff4d1c486a9907d1b0a4e0ff7bdbd88d8c3412

  • SHA512

    16f31b77cd7a6fe2c0a089912970c385e6235f8a5356942faa399293f7cb61fcbcf8de710be3c0fddd7e3d5a2887009e13215cda81d3920dc8ea3f21c8bf57a2

  • SSDEEP

    1536:fmY0aH/NQ27qLfEg8ZW0874ZPmF+lVOCjUxfg71:J0aH/C2GLfcsbMZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4a00adde88030551ffa2020495ff4d1c486a9907d1b0a4e0ff7bdbd88d8c3412
    .elf linux x86