General

  • Target

    1d4f48cca87ed1caa9c238c9bc7658bc.elf

  • Size

    96KB

  • MD5

    1d4f48cca87ed1caa9c238c9bc7658bc

  • SHA1

    44b9d034ff697f014d1e9693ba4badbbec37f7dc

  • SHA256

    3c58b59e0b760311dbfbb2f8532de61ba667b1ed06005c55388f1226f34adada

  • SHA512

    976d8c25eff2da21593d59e72531de5af325bf77e83363ad22e3b8a39c4fa15f39633d23e75088f15dad230ee018951a3469c79d4e99149fa519eb5be4d0adad

  • SSDEEP

    3072:cWCjQrLpnr85EdT9Oa8vqbVr7r/CEgmqAgcVyZIcBI:cf5EdTbpr7rWmqAgcVyZIcBI

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 1d4f48cca87ed1caa9c238c9bc7658bc.elf
    .elf linux x86