General

  • Target

    a57e9c44d8d9f3d4f006c774b747f22339b4c5cf15a0e2a1eb3eea6ede3c6e66

  • Size

    97KB

  • MD5

    2768c467ae154e52ecff41897c19045d

  • SHA1

    e6fdd15e25ee17368a7875ef9fed07cccf1c0186

  • SHA256

    a57e9c44d8d9f3d4f006c774b747f22339b4c5cf15a0e2a1eb3eea6ede3c6e66

  • SHA512

    a9dbb5ed333913b6173125c60c22d43f63a18a6523198bfe1b4c8891f0c307db734c71f98b0439617236bf812d0c1956f60e403b5cc5ba3414e50b546d42d80c

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • a57e9c44d8d9f3d4f006c774b747f22339b4c5cf15a0e2a1eb3eea6ede3c6e66
    .elf linux x86