General

  • Target

    4c4edb370a7b3c93e314f833a5eff11c.elf

  • Size

    150KB

  • MD5

    4c4edb370a7b3c93e314f833a5eff11c

  • SHA1

    0cb269317216e525d8184e3688104667b59fd2a2

  • SHA256

    7f6dc0053d4642df233850287f9b12d70a8314fa7be35db392c115e93e45ef06

  • SHA512

    1dd6d2fce8fe22092169241fc53cfd2835de980e9ea1b6f5831f767b4158f55db4275d68de63032ba6e93bff836771fbdbca859f994203b1835676c890f767d8

  • SSDEEP

    3072:YUBUF0jr0M8t+ZbRniEHwvk2oskfUe0I:Yms0jr0M8t+Z99y7ez

Score
10/10

Malware Config

Extracted

Family

mirai

C2

564sfacnc.duckdns.org

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4c4edb370a7b3c93e314f833a5eff11c.elf
    .elf linux x86