General

  • Target

    52dd3747cf9cc4d8214dcc9d12c198ed97100ef33b02a092b6459b406ca6fca6

  • Size

    70KB

  • MD5

    d7feea98d7adc780368aa1290214ff74

  • SHA1

    1ae8a5b7a7a602ed6d2b74524919df51608ed38c

  • SHA256

    52dd3747cf9cc4d8214dcc9d12c198ed97100ef33b02a092b6459b406ca6fca6

  • SHA512

    0b2062af3e94d9d8b87097e5ba9edef0ed9ff9f76f8aaefffee5597f973e59bf4ce5825d3733a696f47d97cc43d6982a6b84bdff25a9a40afb09e5f9d82e377e

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087KZPmF+lVOCjUxfg71:w0MD/C2GLfcsbmZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 52dd3747cf9cc4d8214dcc9d12c198ed97100ef33b02a092b6459b406ca6fca6
    .elf linux x86