General

  • Target

    4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17

  • Size

    73KB

  • MD5

    d0d3677fdae9ac1c87ec39685a40944e

  • SHA1

    03c19b32f869d11638d1e1c10d07e3f86b627d41

  • SHA256

    4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17

  • SHA512

    3093e873ea853f371081fa93a8c430ee22d7956d32c2e259862d406a1a053dcd968eeea6bdfb42efc6fb167175a9d0cced7b048c01ff88f1a8b6227b46d843ad

  • SSDEEP

    1536:c3Fq/B/nV6WeWa8X/jPZD+axnwVN5JAxJuA3vB4ahgnrXr/ms9:ck/RV66lvjPZqaxnE5JAxfvyahgnzr/x

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4f6263c100b9368f211043f631ceef98880d506a3555e0c23f90370e61b71f17
    .elf linux x86