General

  • Target

    b802a74e6dfaa3cdcc9d2a3e658c1d01

  • Size

    89KB

  • MD5

    b802a74e6dfaa3cdcc9d2a3e658c1d01

  • SHA1

    e5297b830a8888878b28124f7147a7ceb56cd34e

  • SHA256

    5f44c209b97a8e3af578648b408d01b767ef008455233f7485f5ab72bbc3a53a

  • SHA512

    4a1b8dfb4ad6b1b8f9c8f3407d97cf5cb302b23c95a9d72aed223a2e35a810b1ab0356f5fe67d42dfc1b33fa3c304b6dfd8003d00e0355738279c51ddb2898e1

  • SSDEEP

    1536:N/+k8eK+haN2qRZckmjW4w57Vo1EOQryVwCiUH1FVLx8rbrbuqMyu/J33/ZOu0go:N/lVhq2qRhrRVo1EOLVBiUH1FVLx8rbT

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • b802a74e6dfaa3cdcc9d2a3e658c1d01
    .elf linux x86