General

  • Target

    4fe34c0e66a949658f95a028941dcb7246a872dae3137bc70df280f732013329

  • Size

    71KB

  • MD5

    da6affd14fe915bc78acbe8f6db4833f

  • SHA1

    8461b96164e73276ddc16eadffb09fe9c9407430

  • SHA256

    4fe34c0e66a949658f95a028941dcb7246a872dae3137bc70df280f732013329

  • SHA512

    c8064c688c52806f3fcb08c44ae161d29bd6d61211489412d800bac3f2822bf6ac51e02851e27a26f7243cd74e2405e70b907b9fa76281ece7f75c2e5292760b

  • SSDEEP

    1536:0cvN0+9oyjNn50zuBvzBWXGXniuULrBVSmHb/VLaOmKq+0O7/wGfj+i:0cV0+9oyjNn5NBvz0XG3iuMrtb/VVmLu

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4fe34c0e66a949658f95a028941dcb7246a872dae3137bc70df280f732013329
    .elf linux x86