General

  • Target

    471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0

  • Size

    98KB

  • MD5

    68372230a045401869186c86572a7e76

  • SHA1

    4475f7227dd1597d3dfa7d534870020a9a540ea2

  • SHA256

    471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0

  • SHA512

    31054838f86598b9c6a8274839265462e95f8171d8399e1c6390f5f6b23f49f4dc8d782691b92a00322ea01b82c1203bc4f0e57a7310406719436163a4ab01aa

  • SSDEEP

    3072:AV2EouY3Un+WDOno6Wigq+WYMGABmSK0nMPZg4X9:puWUtfPi5jGABmSK0nMPZg4X9

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 471e5d74c4081975827eeaa03abf409323d57015c6b60d348abfa07b6d41d9b0
    .elf linux x86