General

  • Target

    96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba

  • Size

    67KB

  • MD5

    ab0ad24cdabdac84aafd72af4e7f5a81

  • SHA1

    d483d2c137d50da0668dc79295c906c0160a68b2

  • SHA256

    96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba

  • SHA512

    4a811942a37209a8120418daa6db6976b4e7bcbfd9655e32b0fde0638e38e9d0d3e9c50d05d3a75d4e9c10da42b71ddbffc053cbcb1c6a757c923222dfa54a3c

  • SSDEEP

    1536:5w8bIEmDIdV5LTepgWncXy/olDmF+l2OZ/fufYEZ:tbIEmDI1LeNcaYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 96dd9d1a4195bc85c83abfb677048f955ec5c8c30866054357f40eed83b9b4ba
    .elf linux x86