General

  • Target

    08c3bdb04fa0622e629643f6a4ee5993

  • Size

    79KB

  • MD5

    08c3bdb04fa0622e629643f6a4ee5993

  • SHA1

    240c1df4758a6865cba0d0987cbb19b3fdf9d615

  • SHA256

    47ef460763257549abc101b1866bbc9c5bf3b80fb11698a91e072da3ed47c1f9

  • SHA512

    84c1dcd07abd23bf9bf00126a9e4f2499d169df37295ac21d6c9bb211760f9370b87dc64460ee16a1fa910de70b71c9a6152a149c64c4120f77d54ee30ecba1a

  • SSDEEP

    1536:vrYoW7as3D972+c6tsTngPE56XxCSn9gPvjtg0md+wVOz+sXcfW7k:vrYnvT97hc6G7gzXxx61mMwVOz+ucfWQ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 08c3bdb04fa0622e629643f6a4ee5993
    .elf linux x86