General

  • Target

    51fb77f3039175971cbfeb3c3d2108af82485a981e9984ab80ac58b6a7e86d65

  • Size

    70KB

  • MD5

    43c2b6a3c915a8218793f1c5f101dff0

  • SHA1

    d46db572d25f0be3c6c771cdf096cd6bcb12af89

  • SHA256

    51fb77f3039175971cbfeb3c3d2108af82485a981e9984ab80ac58b6a7e86d65

  • SHA512

    a02f5d5310f4fc2104f0694128baa2d885182d26ce2db871a47b0400216745059cdbba436bf66a1b20a13afde3ded335f59343f3b4a4937c1d11a1ada33b08f9

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW0879ZPmF+lVOCjUxfg71:w0MD/C2GLfcsbJZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 51fb77f3039175971cbfeb3c3d2108af82485a981e9984ab80ac58b6a7e86d65
    .elf linux x86