General

  • Target

    fdcdb0ce47802fce665ef0a438b368fc2b6bf3430d174d4aac3ce5c7461223d7

  • Size

    68KB

  • MD5

    2c7d00cacb65fc39c7f81b429c668fa9

  • SHA1

    c38f2ed88b53a4ee41e4ecf8ce395420f367897d

  • SHA256

    fdcdb0ce47802fce665ef0a438b368fc2b6bf3430d174d4aac3ce5c7461223d7

  • SHA512

    db01a1d5560436a556775ec9ac3aa8a8089fac05e68317ccd0f6dd91cfc729e9c6023db74137ef02a716e111375f514cdb87f6b7cae0de6229eb35d6cd8b9949

  • SSDEEP

    1536:NbFk/wOZe+559wf9GzfYNmoUWIz8vTtq9nuAyQFpu3NSFK45:k/waZ559wf9GYcVWIz8vTtCnTy2w3c

Score
10/10

Malware Config

Signatures

  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • fdcdb0ce47802fce665ef0a438b368fc2b6bf3430d174d4aac3ce5c7461223d7
    .elf linux x86