General

  • Target

    4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76

  • Size

    94KB

  • MD5

    012cbb126a73f36f87d1ff8a2fdca7c2

  • SHA1

    e643a6526d827743ce82392ff49f82a45abbee6c

  • SHA256

    4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76

  • SHA512

    b4bff78598f68886c55de1b82b4bf3c4ec5afc3c5a70dd8d6cbaf271f6f6cae9aebd9b3ebc645c05a7af4908b582628fe49def6bbd1447513d0f01fc987e1e25

  • SSDEEP

    1536:NEt6hnR2RPXaVjAW9Yrip3BO8sVEMfWbs5TMWp2Mr+5aCW5dvQLMIlFMnkid4oic:ukR2RPXaVjAW9Yrip3BO3V2Q5TMWp2Mz

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4f5e9f9ea8081e92be4888aa7537297af8ee85e64e3e1bb0a3f467124fab2c76
    .elf linux x86