General

  • Target

    4fb176a32ecb7a6ae522e1e1c6f3835504c1d1591277845ae589bd66434b0648

  • Size

    71KB

  • MD5

    6605a10fb039ba6bcea4d6effce5f1c7

  • SHA1

    468c91e3afb90a29867124cf2599a645ee8ec76a

  • SHA256

    4fb176a32ecb7a6ae522e1e1c6f3835504c1d1591277845ae589bd66434b0648

  • SHA512

    a0ee09d9ad4c73cd7a0f25416b66ed9168887cc4b68ca2d89a47f926e1a079917fbb0f2dd08b9f1200016e6a18bd9046879dfc024536c83863914c990acb037e

  • SSDEEP

    1536:mZsUJS9JhjtF8AQYjgUhK55c5spGofqUqVFFWP0QOFkVmm3+lVrCjmxfZp1:mZtQ9Jhjt6APgUI5GNofL+MP0QfmmOlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4fb176a32ecb7a6ae522e1e1c6f3835504c1d1591277845ae589bd66434b0648
    .elf linux x86