General

  • Target

    4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd

  • Size

    70KB

  • MD5

    ff537f487bf642c54a4227d2167c725d

  • SHA1

    dd56f910ddac4a2542085b266d5a4dc7c8c00872

  • SHA256

    4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd

  • SHA512

    eab4b936b8f251c6225cfc9760daf4702d8cad021c6eceab5c50cd575f3d9fed8aae8f07e5c4f77bbd688e9b0baf9f7c5ec49d366797101b9f2b295580fc2b0a

  • SSDEEP

    1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9iQSggmd+lVOCjUxfg71:+Uiu84DeVplLFfzpSggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4f86fc89e6786314346dc7fdf08909eb9c7ce0f3ed20a4d5bcdc14291174b4bd
    .elf linux x86