General

  • Target

    df104d0e5f903cecc8dad1e1e6b140bccc59d86a7453ddd6653cfe02624ddf41

  • Size

    97KB

  • MD5

    945f1fb1cc610b211ba2eea99647b75a

  • SHA1

    2be455b4a88a3c7adf27a09543986359b79b8674

  • SHA256

    df104d0e5f903cecc8dad1e1e6b140bccc59d86a7453ddd6653cfe02624ddf41

  • SHA512

    a82585f066a4d980a692acd63db7ddee300d95c81c08aea6d3d7bad222e188cee257980e9b09fb63614bf167b4cc947e05bd2b337b9892fdf37642b2bec5d9e8

  • SSDEEP

    3072:Vwjnl6hUPUVyGUWhPBl226ZY1a5h+FjNE2EW0KZ1EUrYq:Yl6hmQ3pWc1a5h+FjS2EW0KZ1EUrYq

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • df104d0e5f903cecc8dad1e1e6b140bccc59d86a7453ddd6653cfe02624ddf41
    .elf linux x86