General

  • Target

    50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f

  • Size

    53KB

  • MD5

    3f7095d6761ccd2c05b6c19a5f1074d7

  • SHA1

    a1c80901ef6e3ef815dd97dbd9a954e36050e3cc

  • SHA256

    50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f

  • SHA512

    1610de32502874572ebb2de93ac3387aa37e1f941fd46f1fd94c9f09374064a5dfcf0bee10fab5839a39d5a2de09b4abaa4bf39e037f1e424c45f1b3b2607788

  • SSDEEP

    768:t49PXMHSe7FiXu4USCe8TjTMOLfxx0XIu5s8qqSqVAqIyz:iNXPexz4USFstLfxx04u5GqSqH

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 50611077f281a112d52ab4d68a6ddabdefcb2da84791d15f39809269e38f473f
    .elf linux x86