General

  • Target

    d22e3cda7b8f83720c4d63e59bb4dc222a47ab5643436d1cbc16f961f9fe0509

  • Size

    89KB

  • MD5

    9fd46aa33747c19fb9f30f6d5b6ee9f0

  • SHA1

    223003aef992c14dec37bc83c700c57eb9541bcf

  • SHA256

    d22e3cda7b8f83720c4d63e59bb4dc222a47ab5643436d1cbc16f961f9fe0509

  • SHA512

    38a18c6665a7b0d817bc4ebde3167b45f510d4df44bc4a1d311c9539d15681391141763af92cb24f6aa213f95d711a8bdf81306aa20c8893dd21851e320118cb

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d22e3cda7b8f83720c4d63e59bb4dc222a47ab5643436d1cbc16f961f9fe0509
    .elf linux x86