General

  • Target

    e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73

  • Size

    66KB

  • MD5

    2f0bcd2f2192cb66e87f5bbafae17e91

  • SHA1

    ea8c6483a72be64a72b4d5e6679de42d94f6540c

  • SHA256

    e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73

  • SHA512

    7d3c68ddf7531aafd0927c33928f04f9b97d7e31896be2dc1db540b3d612dc8c82aec73dca671290fff581c9565336a5e81ba108ead0dbc2cdc5a17913da607b

  • SSDEEP

    1536:6iQsISazUedNkhkwiI4TXrxi85FLcFwzhv7PtKOM23mng2c:6iBeddI8bUGcFwzhzPtKOV3mng2c

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • e8ee9e70091925a17c383dbc99755a974e9355a0e8ab4aedc8f4a024373c1e73
    .elf linux x86