General

  • Target

    d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef

  • Size

    75KB

  • MD5

    2ff713c34fd08ea088554c0745ca0282

  • SHA1

    7deb0f212d8956a274c83cb00063ec35da301831

  • SHA256

    d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef

  • SHA512

    c3dd880f836527f7dae33ef86ec5db5bfbc68b07300c071a638f86a94e8b3c166f617ddcd5dd9a5bbcd80581f36624b117d22e8c486921bfce31be8e9dbb2bff

  • SSDEEP

    1536:CSxY0G1MFZY06cHsX6pCKSt+U2PZtsOutt4LddimF+oVcxjnxj5a1:ZxC1wScHY68PwZtHhnimEoVcxjxj5a1

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • d4bc95ac14b1df9d7eeba43cc71195a37da79c5e1c8e229cdc4968349f22ceef
    .elf linux x86