General

  • Target

    50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c

  • Size

    71KB

  • MD5

    9cd62965ac346dfbba215942e93f5f72

  • SHA1

    7bfd5f8b59e29f7ff453e1679e5d549460299f31

  • SHA256

    50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c

  • SHA512

    f407c66db3a17ad7cc9327be5a0b91486044942d3f1186f1e17850e1887fdb455d627f36366e58dc74c4dd205730d6c2fbc46ce2728c030de13472019ad26948

  • SSDEEP

    1536:0mM1Ft9tpjJggRdotARSlEwyWpi0PqUuEQC+0mjm3+lVrCjmxfZp1:0m039tpjJggR+AwlbQ0PLVQP0mjmOlVf

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 50bd34dcd47f61c76ae1a98058f45b2b71c8da485f528ad9ff3a3792c70f2c2c
    .elf linux x86