General

  • Target

    52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4

  • Size

    97KB

  • MD5

    e9fba285a433dd0ae13854366ec2c287

  • SHA1

    7b91ff95e64aceb4e385771802209277b8e3bf17

  • SHA256

    52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4

  • SHA512

    4d5e08996cff6033b51c63a3bcf134a4c81b69e07bab827da1bfc774b737e203bddd04c1b391ec935b9f6444a17056d21f2997327f3fd9dce79f7bfad8e3f8ba

  • SSDEEP

    3072:WGLnuIGjk4/IhbR9hJpW2rqpadaleeGJQNjjywBKr20:9nuIGjk4wP+sdaleeWQNjjywBKr20

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 52248c437054fcb29af0d08c1fb6a98c2ef8bf2a24e70095251cf7c202ab66e4
    .elf linux x86