General

  • Target

    4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439

  • Size

    66KB

  • MD5

    5ddfb8e7a762ab47fa813512920e1906

  • SHA1

    a3a409bc8fcb9c1237b2b3f00be6275af45eb8e3

  • SHA256

    4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439

  • SHA512

    cf38816b0cc47851e24cde481e44396f0fc965c0abb94645f70a5f7eca7690a57cffc83f970f1377a9195ad34d0b6a8d3f9667ec1d17f484373e6313105d7332

  • SSDEEP

    1536:RRVYPCNH1jUdOn4JymPWBSgSh1MtNbr/NbHBDSDmd+l2OZ/fufYEZ:RRUCNH1gdikrEHM1IBrVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4fbeb93f057bc4d01409f9fe6b868474641672db2faa70681fed33fe95682439
    .elf linux x86