General

  • Target

    5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651

  • Size

    130KB

  • MD5

    c0c7079fd35292a61b1e37c9dfb177c0

  • SHA1

    245fd2c102c81371e03166c8e1df5e320a81b322

  • SHA256

    5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651

  • SHA512

    fe736bc87eb71ab29c7ca416cf0a5da3a93c6e18156cb8968f1098d2447f2a9e90a5cad93061a2785b1c616e1fbb88d8266e62a2a9dd8d6075fd46770e1d2519

  • SSDEEP

    3072:whoCHG4nqI4hEUbdqvLKVc/VnKnUSamqFwQIc6sABlih:ByyyUbY+VisUSamqFwQIc6sABlih

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5d7a6b3f89a97ff4149ec4469b49d1e9bd88a3d037df2f0ed3f3dece441cc651
    .elf linux x86