General

  • Target

    f1458e0938c42044a99d61d18c433c47232e43ea96fedd880b455e81b1c08d04

  • Size

    67KB

  • MD5

    98cec1449766b11f1cdf38fda0b74b8c

  • SHA1

    e55cfc96e170325dd69589fdab1b2f80bfd0222b

  • SHA256

    f1458e0938c42044a99d61d18c433c47232e43ea96fedd880b455e81b1c08d04

  • SHA512

    95ef59e2b278da21ef99193445176474f828ec7a38d467ed017fbc1de52618ae3d087eaa3c1ac4e0bc987ea503b262c0725a47069068beb01c8d1c11285e16ae

  • SSDEEP

    1536:5w8bIEmDIdV5LTepgWncXySolDmF+l2OZ/fufYEZ:tbIEmDI1LeNcbYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • f1458e0938c42044a99d61d18c433c47232e43ea96fedd880b455e81b1c08d04
    .elf linux x86