General

  • Target

    60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d

  • Size

    67KB

  • MD5

    c11f690e97cd4b2f6b7933a603e4cd4b

  • SHA1

    8e4e05548a571f185a987d49c41ea9f09137081f

  • SHA256

    60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d

  • SHA512

    1dd82efe6967996e99ec4e699693b89e515c8b798f9e2aab2f9bca42086cb20c9a3b99bc03fe065d2c4cc473d757726d75dc49d9adea36295e38dd2e5589f8ca

  • SSDEEP

    1536:n28bQEmDIdV5LTepgWncXyqolDmF+l2OZ/fufYEZ:hbQEmDI1LeNcbYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 60667cc72527f3679be509cfa612fc0738e8670a5fbecf881387c692d7bc100d
    .elf linux x86