General

  • Target

    7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385

  • Size

    98KB

  • MD5

    bb9b23ba771cc37d8114933b09b568f9

  • SHA1

    541eb366b02fd58bff466f57af95cc499647da43

  • SHA256

    7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385

  • SHA512

    89dd2b40894f6d84abb59323de9a32160edd3c665c72f6941e6fb4d2c292356ed14b860c01c017c9ef4f2f84cbb4fcb9cf06c942036f9f81ef108347f9379da5

  • SSDEEP

    3072:rAsWIUNN1SvsMn5BMFbp94bHimS0veewQ08N:nKeUaSb8bHimS0veewQ08N

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385
    .elf linux x86