General

  • Target

    5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d

  • Size

    72KB

  • MD5

    ce7972614983a64ead5de0efab4ac50e

  • SHA1

    436c0fe0a001c788f2c211826827f1985d6f741f

  • SHA256

    5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d

  • SHA512

    1f6b7ef97e651ae1ce41946bee3574c9b229c5dd6637783c9d16340e1788a1c816d6add0f2f5062c3c85929468c5f37a3d79410c2e22aad88600ae56610eff58

  • SSDEEP

    1536:veTcLGPwnVjAWnpdHTk4S3um7qasEGWqejaEKEGz2ctxomP+lVrCjmxfZp1:CcLGPwnVjAWnpxvS3um7hPz+E9+omWlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5c932424e5789f8c1644f11c2f9307eb6f84f32e4e4c0ff552a9502669a0ef0d
    .elf linux x86