General

  • Target

    4f931ce719d30f81451ac26cc1d3c98bf6e614528374141bad3f3d7746162536

  • Size

    71KB

  • MD5

    0efc8a34dc1fb4c1d9228af467440c10

  • SHA1

    76ecaa1fbb9ff104301575670445973478641f50

  • SHA256

    4f931ce719d30f81451ac26cc1d3c98bf6e614528374141bad3f3d7746162536

  • SHA512

    5429916ddc779db0877cb43bd8b57bbf8a0212d20c7037b6e6d9b4de4956db9fbe9bfa6bf45f2d69aa0071e12d3d4dc828fdec9412505159d1b16a52c884141d

  • SSDEEP

    1536:1HM1Fm9tpjJjgRtotARSlEwyWpi0PqUuJz+qCBEo2fm3+lVrCjmxfZp1:1H0A9tpjJjgROAwlbQ0PLwz+zBUfmOlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4f931ce719d30f81451ac26cc1d3c98bf6e614528374141bad3f3d7746162536
    .elf linux x86