General

  • Target

    4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61

  • Size

    70KB

  • MD5

    7870b160c025b609b563611a2b5ed7c3

  • SHA1

    e5c22a8fcd51b4612e0f0dbc7ac07720706ed0e2

  • SHA256

    4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61

  • SHA512

    6bd3c3e2474443f8f3449d7f95c229531c8c1d7e5aa24f12761d4f9bfcd61b2762a4ee8334df0f070a755048111e96773250fe9cefc9e6d2c32965a9a789909a

  • SSDEEP

    1536:CIY0CH/NQ27qLfEg8ZW0871ZPmF+lVOCjUxfg71:q0CH/C2GLfcsb5ZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4ee7734bc2d6fd895ecacf110c17d00a8f22b9d9e9238c284aac529e39dc2e61
    .elf linux x86