General

  • Target

    0c3967218be523eef26e9bbeb5b7ff22

  • Size

    70KB

  • MD5

    0c3967218be523eef26e9bbeb5b7ff22

  • SHA1

    375d75084dbb99f8699787d77b52b69630fba0d0

  • SHA256

    ead6798c46f8d7cc059a73492aad6836da5a4d63af76a6c81f99c2069c7dfcef

  • SHA512

    8f5f3f5b6165a4cd2f70c3bdac91d11ae2089a9873200be8f9e5666e1db34b9fc776f08c176567e192ef751e687f7fc3d490d45041737eb6b50871a1bd389c7e

  • SSDEEP

    1536:zkI6X4yTHql00pgdz2LtV/f4BU9Sn5qp1:z87HDz12V/w60nE

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 0c3967218be523eef26e9bbeb5b7ff22
    .elf linux x86