General

  • Target

    55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881

  • Size

    67KB

  • MD5

    1dbe0f7d4181fa0a5dac884757f0af95

  • SHA1

    376370791c02f275a18ee8d6ff2069c64a46129a

  • SHA256

    55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881

  • SHA512

    130f27c59d08599fd21d379a09ebc31f721b943271192f48c9205004dd1701791c4cb0be015304f98c054a7963a4da2e310a93747ea444cfe22cb7312187524b

  • SSDEEP

    1536:e98b4EmDIdV5LTepgWncXyocLimF+xVOV/fufHEZ:zb4EmDI1LeNc9GimExVOVXufHEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 55d5251187c7a21ab0adafd94d519171cec9e2a7ab9e429b715500ed9f896881
    .elf linux x86