General

  • Target

    c1e315db0e3d28a58a902b6b7e8fd701

  • Size

    78KB

  • MD5

    c1e315db0e3d28a58a902b6b7e8fd701

  • SHA1

    df44b9c4d1b580e26bf792af851df69d5270e3f7

  • SHA256

    45f408a5a45b83b8a07449eeeccffe09e48be3c722419f6eb51d0905c3630e82

  • SHA512

    2ba2892b0f5af735641516b9ea3d3c1b9b6894b2f5c523b860f55323e41d07fd2f61a06623c9d38908d9c99c89b30943d818d82fbbe1dc90c53640131f1d75fa

  • SSDEEP

    1536:dTZ5s8rEzIWwzo1s1P/WG4Hg2lNXTAdRPAExV6oKEDNKyjOUIY/1k2RnpVS2:1LrEzjws1s1/WGJ2lNjAbXV6oZNKQOU5

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • c1e315db0e3d28a58a902b6b7e8fd701
    .elf linux x86