General

  • Target

    57f9e21c3a2d84299931197263c41964cc417fa6d0dfc5b87d1bbb646114087b

  • Size

    117KB

  • MD5

    e44b3645d2d94a07ba978ce0193bc559

  • SHA1

    16b0be80a6c618c5c6e8aabacc4ed848b69fe1a9

  • SHA256

    57f9e21c3a2d84299931197263c41964cc417fa6d0dfc5b87d1bbb646114087b

  • SHA512

    e5ffdccb76085cdc9ef2b52098796448a0b55c83ec3a02c2a4ae22da46493a37b218874da414951a5cb3f606ee6b50f4d922a070dcd45c5cb3ca186a22065268

  • SSDEEP

    3072:esDxplJdXvP5EqDUP3UsqiCtlAMLln3p8rg+Z0Ua3hgp6W:XDxp5vLPiCzPx3mrg+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 57f9e21c3a2d84299931197263c41964cc417fa6d0dfc5b87d1bbb646114087b
    .elf linux x86