General

  • Target

    e4921180eafa91a234b1034c772ba887.elf

  • Size

    46KB

  • MD5

    e4921180eafa91a234b1034c772ba887

  • SHA1

    8c66fd601cac2611b22bd69a7862b25e8b9a2e36

  • SHA256

    b7d0d17ea7871db4d8faf0ddddf30ce24ca142574b48362f7f82ca349ec9e2f4

  • SHA512

    3004c1632e15d54a72dc4665351699ae65494abf15f000982d3dcedff77ffcf755b6dd18316694ad8d688166d120051f0a59c9f2e8965eaab8c880bf54ca8327

  • SSDEEP

    768:eRxm/aDxX7Wq3X5RJrdNW3Jq/BgxSh//Id8Np/JIB+Mq0uwcS:0US9X7PnDA3JquK//IWp/JBDScS

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • e4921180eafa91a234b1034c772ba887.elf
    .elf linux x86