General

  • Target

    549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea

  • Size

    70KB

  • MD5

    b3c2deccf0295bc90b76b0ecd014a8fd

  • SHA1

    a5ba032cd006e7b2608cf49428d1a60599bb1c6d

  • SHA256

    549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea

  • SHA512

    1dba90aa9480147500ea82439147968e75f90a03d4897af2650c60a6e380a61773897978d95f6c3aacab0eed6e02c842e30a00c951a3ff7cffd2d29dda3b26e5

  • SSDEEP

    1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9isSggmd+lVOCjUxfg71:+Uiu84DeVplLFfz1SggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 549a8210c042b4b2bc967539ffbf254dcdb94155cdcc138ee20246e2112bb0ea
    .elf linux x86