General

  • Target

    5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831

  • Size

    113KB

  • MD5

    3e5e0d8648db4dbac083b6d98ab27055

  • SHA1

    cec24bdf7f83c46d3aab451dac9d0f0b4b8fa026

  • SHA256

    5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831

  • SHA512

    be386a937bca485c7f9712b19e86a4bb27e18782564c27eebe6a5319b9def04b3c029d10edf8e60688a23d10acbde8ebea365224904a29a19d278e3e47567a64

  • SSDEEP

    3072:Qvzla/zS8QUGzBXaxntk/TBWFpA1t+Z0Ua3hgp6W:f/zS8dgYjGTBgpst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5d5f8b47e43db31a3a024a48eb7b6c65f668e8fe1160c2c57c16ca5b7e68c831
    .elf linux x86