General

  • Target

    cdcd22ddc7ab72fc151985dc22ff2091ba94e89f56087c32825ad19e14eef62b

  • Size

    66KB

  • MD5

    c7c3739746b7c2b2a32014cf9cb17563

  • SHA1

    5b2ebc752493c58ff839cdc06f9f651a1fffc707

  • SHA256

    cdcd22ddc7ab72fc151985dc22ff2091ba94e89f56087c32825ad19e14eef62b

  • SHA512

    58359a76c54e7a4fcabe2025f662a4c8bc111a9a950133873cb3ba7424de45c652bf2015433a3bd747201c048c7f15b131b6d982fbe1158d1c0b32f07197a965

  • SSDEEP

    1536:CWVYPCJH1jUdOn4JymPWBSgSh1MtNEr/NbHBDSDmd+l2OZ/fufYEZ:CWUCJH1gdikrEHM1IirVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • cdcd22ddc7ab72fc151985dc22ff2091ba94e89f56087c32825ad19e14eef62b
    .elf linux x86