General

  • Target

    5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7

  • Size

    72KB

  • MD5

    2f66c5199bd894d0192d4dd702abc568

  • SHA1

    8354008ff954e50d5dda27b243848cdbbdc298b4

  • SHA256

    5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7

  • SHA512

    d0ff79a78a0bcd043cb43f6d18201b718cdc4d39387473c2e6f120d5d6f1e645070c405c458e07f8ca8df4d4074aecec8cf847e96f588191102eae9c3db9cf63

  • SSDEEP

    1536:kegsPutVXwLcrBa+U4xBBVuaCwrzaNxl2zE2OR3v14ahgnrXr/ms9:k8uQQrBdU4x3UaZExl2gvWahgnzr/ms9

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5c728ff372d202628ad80e65deb117fcd3f9ac349408c42e948ea2423bb231f7
    .elf linux x86