General

  • Target

    5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f

  • Size

    79KB

  • MD5

    12e3c75b536f95611f2d21c794a2765c

  • SHA1

    ebcb6e48d372d854258fd6965d4433f4c1297cbc

  • SHA256

    5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f

  • SHA512

    3f2da38faf2e021175d100dddceec760b6dd36ec86b37b58adfcdb43966788ed55f88f87f55eb74798ba43a3a6b130826c9958e726f9da35ea0dc9fcd5ac2f5b

  • SSDEEP

    1536:KNQyKAd9ddjQ/uRsGyHan2hG8epauzogbBXCAmq8V+LjA4vmF+oVcxjnxjIOO:KNrd9ddjQ/uFEq248epVBX0p+JmEoVco

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5c4f8e6bb727a35d41b526dc9e97e5c75361c9f55f4b9fbfb4329d2bcde0476f
    .elf linux x86