General

  • Target

    cfa60789d863651e06decb2a8bfef755fb7d8b1d97f60aec302bf51c0ff7c24d

  • Size

    76KB

  • MD5

    4a25ab59ce0f432e30766eba51f79706

  • SHA1

    94c266a83b4c6e98c7f3be25452de4d39ca43437

  • SHA256

    cfa60789d863651e06decb2a8bfef755fb7d8b1d97f60aec302bf51c0ff7c24d

  • SHA512

    46824f662ce812d44837d475c4eb3950eb82a13913c7c0ec89dc0b33d3ba18ce340b529c998c88364744f5325f2a0957d234d3baa2c9af38ff283a793604edff

  • SSDEEP

    1536:tPyqjZa/jtgTW+8tLv59+feWyQXGNh5/n6eEe/b3vB4ahgnrXr/ms9:tdj4Lt9ZBv59+mWyQGh5/9/jvyahgnzV

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • cfa60789d863651e06decb2a8bfef755fb7d8b1d97f60aec302bf51c0ff7c24d
    .elf linux x86