General

  • Target

    a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da

  • Size

    66KB

  • MD5

    cb83df289f448aab74352cf22b097b61

  • SHA1

    ff8d0712f50bc2263e9c3eb51296ec80dc60166f

  • SHA256

    a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da

  • SHA512

    be7fd88d6d7f35867ca0d982f2e19e5cc117b5091922cd00631a3ed2975d207d736e5fbd427cff5f32e6f45269f3bfc600274fbc3a9522aaab47f56114b02a37

  • SSDEEP

    1536:62NiGHuSQdhfI31+iLm89rh1f9B1+vrxE3md+lFOZzfufHEZ:62oGHuvdVA7dt11vYx8mMlFOZLufHEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • a9d571d626081845a0b15e9e17dcc99b8a48e1fea54486c6fa6554f08055b8da
    .elf linux x86