General

  • Target

    c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe

  • Size

    78KB

  • MD5

    503ed7b12ca5edbfff746c5e65d48472

  • SHA1

    d4cb9b4db6d2694b037a25ce5c905eef2b570562

  • SHA256

    c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe

  • SHA512

    50c366adcfe34589a3942d171dfa8ef73a95780032f89a5c383c93c90e0306fbd2afc8e4eea55a471a06a4a3cef0fa1dd7ae5bd4777843d549bb236f077cea46

  • SSDEEP

    1536:qoJk9t5sPrPVj6WH0NnpV0ksvKwwOEReg4BsKhWH88V66666flm8E1V8zlimP+lJ:Ot5sPrPVj6WH0NpqvzwOEReh0cZlI7m2

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • c90a2f92695e949ec81e5fdca2eb6c5359c9556405decbd657a0ed18150aeabe
    .elf linux x86