General

  • Target

    b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171

  • Size

    88KB

  • MD5

    9f5539855206f18972bdba5b20964871

  • SHA1

    cd74570fa3d93dc7b5f8eb255aa1c35fa5e5ca35

  • SHA256

    b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171

  • SHA512

    22e3f5cb55f2c6749aa3ca9ecb57d45a536c2115bcc7ff850b67d965a32ec930af7c0485471afff5552e7df2ff49e2910bcb0c64b69206adfc9421f78ae18257

  • SSDEEP

    1536:7PYZ+aJKWsmUsgK+SQyqYKrYWlmQjL/jqiBE3V+awHL5pseTClnsPGJUkft3LR56:7PYcmBgK+nxUQjL/jZEQawr5pseTGsOI

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • b0b59d6518658173be28d5f5124f21cec6f486ee48e54451d31b1153ba03d171
    .elf linux x86