General

  • Target

    1792a888a66342897808422e4b5e468a

  • Size

    105KB

  • MD5

    1792a888a66342897808422e4b5e468a

  • SHA1

    68575319b4422236c9c2b65568984f9aa963df82

  • SHA256

    daf477a0e795231e5b581db4762e13780d13dccc17003c36315c7543253784d3

  • SHA512

    a9d3458fb85998efea41568902eee543a9023ea8a4d5358adb631d9af04c8324333ac03cf250a7ad530580ad0fb17482709f637e5a1adc3bb7c9ed014ea1139d

  • SSDEEP

    3072:7e/9pXsh9Ke5TB9xV4SW7V/CC3+OxPh0jxKp4PPW:m9pXY95Dxgpz0syPPW

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • 1792a888a66342897808422e4b5e468a
    .elf linux x86