General

  • Target

    60ba58f12750ba3838d838595ae81670f189e7ad5473761df111fd043b054c23

  • Size

    71KB

  • MD5

    d67232b1bf4dd6357fd0bef16270e281

  • SHA1

    85fbd73e33b3268c20bf8ba59b29d49d8c7e2121

  • SHA256

    60ba58f12750ba3838d838595ae81670f189e7ad5473761df111fd043b054c23

  • SHA512

    2463a494c5547b8a5c29cca489ad5e86fa4271dbe9940e924f9160af920d0b1073ae70e412a01e5f02c9f572ba7a2639811788498fe60bbb80a72b4b1833a3c2

  • SSDEEP

    1536:1eIsLGPwnVjAWndVI5kwSahUVg40zW/MC5rEvIpvYQomP+lVrCjmxfZp1:jsLGPwnVjAWndONSahUV8Kks4momWlVf

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 60ba58f12750ba3838d838595ae81670f189e7ad5473761df111fd043b054c23
    .elf linux x86