General

  • Target

    385db4ce372a20f1e2b9b70045dbb27f

  • Size

    89KB

  • MD5

    385db4ce372a20f1e2b9b70045dbb27f

  • SHA1

    1fb9e86f78ffa0f95d274d533d1d9fc87f5a42f6

  • SHA256

    9cb7ab99948f43d321b6782cd0ba3044e3cc886cf2786220ab4c2217603afb01

  • SHA512

    f3c38218d0aed9955e17c95cf8120aaa8245b7dda3bba990e0943d6711e21fab92525e86d31d46913aacac2535f6824394426c796248922d7a74d28043e5ab2c

  • SSDEEP

    1536:1DsHrBPQNMcbMarLyEeHu7OUvsEyabYB5b2LV2xOqnJ33SZQEgk:ZqqPMarLYu7EEY/2JOJ3iZQn

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 385db4ce372a20f1e2b9b70045dbb27f
    .elf linux x86