General

  • Target

    c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9

  • Size

    66KB

  • MD5

    dc9dca9b4dbe131828037bfe07d34544

  • SHA1

    c55f794ce33530a65dd516c7afe48f9b9bed3180

  • SHA256

    c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9

  • SHA512

    e700085e6e47bd6ca0b2bf45f76ecbdda1ce5f47e7d787a704ae1609748202120d8dd1d0bd4a17dada6d1b1b7478a20e9dd8d1e02c394be3fb48d3a4d60a9c16

  • SSDEEP

    1536:CWVYPCJH1jUdOn4JymPWBSgSh1MtNrr/NbHBDSDmd+l2OZ/fufYEZ:CWUCJH1gdikrEHM1ItrVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • c960da645a5032b0b589a1fd65cf91f087d24fa211756c0e7dd583df6de5c6b9
    .elf linux x86