General

  • Target

    ace1f0e4737a7365d6affcdf37573922a39063bbd25aa2134b7a208ac0beb5f4

  • Size

    70KB

  • MD5

    73df8494bd9c49d8c07462beaa7c8db5

  • SHA1

    5d0058fb6900540bf2890b2a4904a0818795e9e7

  • SHA256

    ace1f0e4737a7365d6affcdf37573922a39063bbd25aa2134b7a208ac0beb5f4

  • SHA512

    7c2734278aad0cb3a51c4f9654e275e174789c1691349b0eb8b24a280a22c318bfee9039714669dba6f039eeb14cc557c81411a94ea7e5455bed8d0f535dc371

  • SSDEEP

    1536:/taBNxGAEV8+494o9nlmqe8ThfZ9iCSggmd+lVOCjUxfg71:/tiOA4DeVplLFfzLSggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • ace1f0e4737a7365d6affcdf37573922a39063bbd25aa2134b7a208ac0beb5f4
    .elf linux x86