General

  • Target

    a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186

  • Size

    119KB

  • MD5

    7090976b3d3a3985d69dc5ede6be6089

  • SHA1

    5cf879d9943828b368b8d72ffa5bbf69b8e2e473

  • SHA256

    a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186

  • SHA512

    52dd93296e0a5c8ee18557a8395f0aaddddf40eb96344c1db0ab7666d5c3791431eb9cc4f8231a488d372c0745e7de4edf5f776ffc8ea201bde50c6c496b19be

  • SSDEEP

    3072:6kh77IqRbg9YMSwweA4G2JfF1Y3+kv69ny6JP/KTiFi:6ExbgiMCoZJfg+kv69ny6JHKTiFi

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • a4ea4942fe451a7d550c9d38362687f6a26fba6e8b7ddef1141cda029b8e4186
    .elf linux x86