General

  • Target

    494b218e76adf620a0a1944cdebd35d017ab47f00b5d579159a98dc9a52b2b0f

  • Size

    113KB

  • MD5

    22dc4519db91c683d5bbf0279c975e73

  • SHA1

    1691ac956864523af63e7fab2568b199053cb5ec

  • SHA256

    494b218e76adf620a0a1944cdebd35d017ab47f00b5d579159a98dc9a52b2b0f

  • SHA512

    80b19d76c06070ffbbd31209577b8612d337454da39e5daa0c78a081b2ecae8eb37ee3bb63faed7bff258e771d1f7ac2d834ef0e3e7c01b9fdc04171da6972d3

  • SSDEEP

    3072:QwLla/zS8QUGz0Xaxntk/TBBFpA1t+Z0Ua3hgp6W:u/zS8dgLjGTBnpst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 494b218e76adf620a0a1944cdebd35d017ab47f00b5d579159a98dc9a52b2b0f
    .elf linux x86