General

  • Target

    39ecb85296b4efed82c1a0961d0227ad.elf

  • Size

    47KB

  • MD5

    39ecb85296b4efed82c1a0961d0227ad

  • SHA1

    6c4e5ce79d707a880309e122b2c2628204b5f647

  • SHA256

    63fdcbc4c601b1d506d420510379882e717966e9739e3c8d0e040df6093bc180

  • SHA512

    17e4cf4b9028f05ff1f8acaa32bebd73c7bbe8bdf793fafeed9468bc0cf140add475c7f4b13de54c6eb491c92df2e0ae9bc384b0ddf0a9dde55003f5587ce1ef

  • SSDEEP

    768:KgtmwTPL4dKYWUTeRCiAUTvqRI3HRampwEvBIUIYpKil1aVdcS:lt7z8JWnCATvR3HR1BF705cS

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 39ecb85296b4efed82c1a0961d0227ad.elf
    .elf linux x86