General

  • Target

    65e8a78d64704cc9af4d19ef090ed81e

  • Size

    101KB

  • MD5

    65e8a78d64704cc9af4d19ef090ed81e

  • SHA1

    3439e4051086f5d1aa3dc84206ca37bc51f7991b

  • SHA256

    2d5207861f9e0ed521792b82920b218535499c8a02932b484f0a9df375992986

  • SHA512

    aa69d684167ada4b0ad0178dcb5d088f3f48573fe5fec7ff29c99ddbd10379e67de26615c0e7493498b3461200b2c9de4e77b6cdb6618930b5656a1a86b93362

  • SSDEEP

    3072:SOGAEtZoGZKWl6u4YTnbH3bimmFVcqq0G27ZT:SqEtZ755nbH3bimmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 65e8a78d64704cc9af4d19ef090ed81e
    .elf linux x86