General

  • Target

    f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb

  • Size

    70KB

  • MD5

    b530ecd262db03f16fe800147cb10871

  • SHA1

    16606818ca98a13e70dbdf37c9a3468c1cb84610

  • SHA256

    f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb

  • SHA512

    ef58c252a1b6f5bf7ae0a2967dfe5f4ae7650bb0800a5f6f59d55888453c291c578013abdff6ce8b90eba921809f16310d797756662e3feed3e16b17a3be4e29

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087vZPmF+lVOCjUxfg71:w0MD/C2GLfcsbjZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • f9049309b62e9da2fe351a89ece1222fd468d68b720b8be9cb6d47824e3f7fbb
    .elf linux x86