General

  • Target

    61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151

  • Size

    46KB

  • MD5

    98613e0c9ab6b7435aceffb5dfa4e7b8

  • SHA1

    2e082f737bf29175769efe3991dfd752e418f6a2

  • SHA256

    61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151

  • SHA512

    760747051caccce5e5951cdc7e025d76c1cf538b8811e9660812b1073c04cc870cc45d48e737ba5cc58c2de6402bfdb1b0278166bf3a424b2f72dbc41a7fa0f7

  • SSDEEP

    768:tls5yOVuduuF6cfG8JDnZ73SCeoyDPIih897xkM+aIO:tlNyudLF6cfG4x0oUPIia1p+a

Score
10/10

Malware Config

Signatures

  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai_x86corona family

Files

  • 61704b508993d715756134d4f51f29677d6db5408137cc9a809aecb3757de151
    .elf linux x86