General

  • Target

    4e079d3a760decd85cc2f41a70dbaf11d9b7ec85e6fc2d6bdca42f3697b0b646

  • Size

    80KB

  • MD5

    b15e2e2a6bbade51f810bae639a03923

  • SHA1

    c54bf9537e3a8e4c02b574b00beb1b524ecc9ded

  • SHA256

    4e079d3a760decd85cc2f41a70dbaf11d9b7ec85e6fc2d6bdca42f3697b0b646

  • SHA512

    c54480d266ea4f050eb75c02480b099f44cfa763e5d6f60ca536527bba7d9765ec38e2881da74ece7069dcdbdbef131dcaee26e4e146a27fca37886a61c4b134

  • SSDEEP

    1536:nzS54rAR7asoLehUUzrw90cm7b9sL8E+32GhQIKnRrJmZOJo:nz1AR7oL5Uzrw90lb9sLx+mGhQdn9Jo

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4e079d3a760decd85cc2f41a70dbaf11d9b7ec85e6fc2d6bdca42f3697b0b646
    .elf linux x86