General

  • Target

    4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59

  • Size

    88KB

  • MD5

    eb39a80d74e3e9fbc2e1b51cbc5b6f3f

  • SHA1

    56c1d9c7a2105aa4f57ee6faef3f3e3d9b32ffde

  • SHA256

    4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59

  • SHA512

    80c1ea975e5d09432f7ad39f02c90b88b0a1b625389e386e1c23344a3d9d90e86311d3fe3fd31aedb782856f3761b41a80e584c40539b1b23d08c3fa2ce43b6f

  • SSDEEP

    1536:IQ9yI+0nr5DPpsVjzWyqkJXxwnwWVM50NKuHqxPb5HOwygdxETSD5IygmdICV1Xc:RM0r5DPpsVjzWyqkJs9q5AKuHqxFHQgo

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4f2a344220220db26bc657e28d02f69e5b26fd3eda47a8463f07b67a58a04e59
    .elf linux x86