General

  • Target

    b2e54d12f64cda97e44fafe06f1c29c4

  • Size

    78KB

  • MD5

    b2e54d12f64cda97e44fafe06f1c29c4

  • SHA1

    4f6f869f4e9cb3c4de3e87b7dc42fcbca1da89bc

  • SHA256

    05a7120861c3ad87a4847c9d71e575cecd1ea11cef3506537ad56379ee3172a0

  • SHA512

    7acbffd8b69a2f61355b0c3b703233572ffa70971cd5790e5451e4f9c6c1f76ea9f5d93dc29c432da4493fd662daa543ab962cb43ae5d9cd0aa21ce2b4716104

  • SSDEEP

    1536:ykuBPyndcwTdBP5Zzs+Axh3zjw9dvHTJx7SWn6Nh6Nq+MkEucluMwc4KQJ:cdyndc6dBxZzkxh3/wDbJx7SW6Nh6rMy

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • b2e54d12f64cda97e44fafe06f1c29c4
    .elf linux x86