General

  • Target

    d0a8fa32aa5933a60e53bc345fbed3e9d2649dc4121b78f14237db2998dac7f1

  • Size

    97KB

  • MD5

    539ff6a2953cfdb8cf2df75eb8ad1c42

  • SHA1

    b6bf6a39728416ae89eea3c7dbe7d46e839bbed4

  • SHA256

    d0a8fa32aa5933a60e53bc345fbed3e9d2649dc4121b78f14237db2998dac7f1

  • SHA512

    61018c14a71512a3f3e8d6cf681808eb6235bc84fb4ae14bd605a75ea23b88fe6ed66db71c058f4da12071863ea4e0ddd80be8a1fecd29efefd6bce2b6b6237e

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d0a8fa32aa5933a60e53bc345fbed3e9d2649dc4121b78f14237db2998dac7f1
    .elf linux x86