General

  • Target

    b25d7b88d3e9f4e41103eeedaa82aff3ac27492b9375b8fd1ab4ea1edb39beca

  • Size

    84KB

  • MD5

    a2513d3fa21a44be02edd342b0730f5c

  • SHA1

    2b3dfc31bc01f9e57a8a33b881eef0be3a8f337e

  • SHA256

    b25d7b88d3e9f4e41103eeedaa82aff3ac27492b9375b8fd1ab4ea1edb39beca

  • SHA512

    4bc80ccaecfb9e0897c6516452a378352e2103360f34a704b668a335c3631e634861bf80a315df8d1dd69bfa67e5b4bec7619c074b434c6cabe6e0ff05444e52

  • SSDEEP

    1536:UUhJ4xYqSrD+xWrMhxwCZKl9jaJn4BYmHGS4m7IAgcJjmAI7wp:z4xYqSrFQhxwCZ6keB+mkAgcJyAI7wp

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • b25d7b88d3e9f4e41103eeedaa82aff3ac27492b9375b8fd1ab4ea1edb39beca
    .elf linux x86