General

  • Target

    48f0068a6d64b82dd1a19e42f37d7f2098b158bb4f0b21a0763930b525323c76

  • Size

    113KB

  • MD5

    fb0d76f758c30429e3e68460e8d2306f

  • SHA1

    51a5c4544167b7e09aba74e83bf35437505f6e76

  • SHA256

    48f0068a6d64b82dd1a19e42f37d7f2098b158bb4f0b21a0763930b525323c76

  • SHA512

    0b03d851952c6e143696a2eef89623e8d230856ef6c278dfce1e6b71b4f891984f3a14d551d1379680f52c2abd3c1e7362bc3ae06e1b19f4169bf8bf9f4a2e22

  • SSDEEP

    3072:Qvzla/zS8QUG7dXaxntk/TBvlpA1t+Z0Ua3hgp6W:f/zS8dI8jGTBtpst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 48f0068a6d64b82dd1a19e42f37d7f2098b158bb4f0b21a0763930b525323c76
    .elf linux x86