General

  • Target

    d2b4d032e372b55e5c71c2be132876748446709f6b5da6794d3bcf50ea2e6c93

  • Size

    66KB

  • MD5

    9e767d94648a81f2d4e519372a560fcc

  • SHA1

    03429cd2b1cb1aeb87ba5e1b68fad5ef3ca9e43d

  • SHA256

    d2b4d032e372b55e5c71c2be132876748446709f6b5da6794d3bcf50ea2e6c93

  • SHA512

    53a57417804a0eb8c3b14ab07f57c8e62d6bd5576a069676fe5df6738b93a1068eedb77851aa6baddacc039216e53868cdbbb1d551610b7aa53095f18a7dee54

  • SSDEEP

    1536:zLVYPCpH1jUdOn4JymPWBSgSh1MtNAr/NbHBDSDmd+l2OZ/fufYEZ:zLUCpH1gdikrEHM1IurVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • d2b4d032e372b55e5c71c2be132876748446709f6b5da6794d3bcf50ea2e6c93
    .elf linux x86