General

  • Target

    c10adc9a150d45c3556231f349f2ef4e71e2f0cb16f0aa5b52760c7160a3c82c

  • Size

    67KB

  • MD5

    c3d0cad39632086f022acf2a661bd369

  • SHA1

    5fdafe884c31844a56af1f0be73d34e1e29daf35

  • SHA256

    c10adc9a150d45c3556231f349f2ef4e71e2f0cb16f0aa5b52760c7160a3c82c

  • SHA512

    47acea49a6b2ec0cc969118493d90e638b34810acbcd97afd13686f96e4269baeb112957c751ad643af72753a0a37e4b4a57d18d7b10ebbabb4f523f5709f190

  • SSDEEP

    1536:e98b4EmDIdV5LTepgWncXyuolDmF+l2OZ/fufYEZ:zb4EmDI1LeNcLYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • c10adc9a150d45c3556231f349f2ef4e71e2f0cb16f0aa5b52760c7160a3c82c
    .elf linux x86