General

  • Target

    5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c

  • Size

    70KB

  • MD5

    239ace375d103e672ff6c5ecc0209781

  • SHA1

    5700e384737c75dbf179e0b703dd16887300238f

  • SHA256

    5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c

  • SHA512

    f7df21780b684f901fa9c20eb7c94a59463c784cee5bfc38b940a9f198d4d354eab5586b86455f0b45fefcdc3c3058f04065133d454e77078861df63713a6e5e

  • SSDEEP

    1536:h2aBNtoEV8+494o9nlmqe8ThfZ9iYSggmd+lVOCjUxfg71:h2iDo4DeVplLFfzVSggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5d43ccacdba33da2fc646bb565ddec37d88a14d043a472938e15b1842d629c4c
    .elf linux x86