General

  • Target

    5a8ab07d811a8a0783d4bdcde84d954514ca4be2b3695dff9b4a78f779549ad1

  • Size

    118KB

  • MD5

    b3fd9052ea4d3493c8d0160f3958d4f2

  • SHA1

    8b22cf42405da53a8e08c295d55fe92d6620f5a5

  • SHA256

    5a8ab07d811a8a0783d4bdcde84d954514ca4be2b3695dff9b4a78f779549ad1

  • SHA512

    de9e4496c03d99e9c7d082e60561450ab9e898f098e5f6d8a6d36a69d277e409e602df916117cf1b6bcc14495b440a2bf556dd419dc346898771cde225ad15c1

  • SSDEEP

    3072:Cn6e1pOjlDR9v3j65lb0fPUDKOvdSpL5o4t+oVUaKhgdmr:IpOjl99v3j6nbuKlv6Lm4t+oVUaKhgdG

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 5a8ab07d811a8a0783d4bdcde84d954514ca4be2b3695dff9b4a78f779549ad1
    .elf linux x86