General

  • Target

    65477314806339d67391280649433c8cc75851f6b267e2aed973456b42f32466

  • Size

    84KB

  • MD5

    f0230cd509be777da6d4fb28df4a070f

  • SHA1

    646fb996d8161bc225609d6ae260d4077aeabbca

  • SHA256

    65477314806339d67391280649433c8cc75851f6b267e2aed973456b42f32466

  • SHA512

    1bdc8801cc219e98460d9a8565d662866c17843ca9d0971af2d195e10970d3bab376d5afe16463ce14e15b551afde312a3923b829352381668bbfad3790715a6

  • SSDEEP

    1536:MqhR5GU4M+TvuBdp/lqzNWKv8jTCk3xAwO2cqm7WAgcJjmAI7Hp:MqhGU4Dvud/lYN3kjWyAqmqAgcJyAI7J

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 65477314806339d67391280649433c8cc75851f6b267e2aed973456b42f32466
    .elf linux x86