General

  • Target

    525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247

  • Size

    117KB

  • MD5

    a5da26f523209efff0f1f354e0382121

  • SHA1

    486c64a9f1a5af9f467b3e8dbe71e336425ea409

  • SHA256

    525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247

  • SHA512

    060eb9abeda55d14e79034091d75667b05ab7d0c354d7972b925c78c31329ef4237c06fa53b47519e0cad2b8fd4a54a5c44ead79fd1b78dfd1fd5873b46c199d

  • SSDEEP

    3072:VR9D575zPQ2fWxb0GQGfl4ckclFb91g+Z0Ua3hgp6W:fR57m2cGckeFjg+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 525b0c030e12b76af5556393de3e63a771ae8697f90e2560b0217879ee851247
    .elf linux x86