General

  • Target

    60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439

  • Size

    113KB

  • MD5

    6e74eb026c7eea49433503edcbb69981

  • SHA1

    a116ed2a51baef403c43c58bc4ce1f81da9137fa

  • SHA256

    60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439

  • SHA512

    13e7170fdbc76e10d95b2f99d672dce2ba14ccf356ec1f94b7a355f237d714222933935454e65f82e61de868d642df8a4199fa7e2fc5bbdf83404dcfac7703ee

  • SSDEEP

    3072:GXglAOgktOgKbN5PfFesjC4msFCWHt+Z0Ua3hgp6W:GOgktOpXkaC4meCwt+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 60fc46fa0c768c423e969c960d7d891725375cae34a2e03148801a859a3e7439
    .elf linux x86