General

  • Target

    b5a83d85264d4c0f7c14d1272831e365f2fe5c30cf624035858816c2264beb22

  • Size

    97KB

  • MD5

    835f913d3259cfda72338e69c2fddff5

  • SHA1

    1ff9bbc39d6b002d2944009a1d12e54dfb43d87d

  • SHA256

    b5a83d85264d4c0f7c14d1272831e365f2fe5c30cf624035858816c2264beb22

  • SHA512

    0f51ee130413f3d63c247a3e6616f347121fb308d4f38a2546956b07cd6144844f39704a07144141709cab23d4be709720b8bb527f9571f54e77ac851b5797ff

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b5a83d85264d4c0f7c14d1272831e365f2fe5c30cf624035858816c2264beb22
    .elf linux x86