General

  • Target

    f6cf08d3a98a95c77655fa4fea07a7c41a19185159651d8e893462d9e7ccee07

  • Size

    126KB

  • MD5

    5d5e2eea22511b320c817a3cd00f8043

  • SHA1

    7c0b1602afd38bbe77b1ae897c0f0259d012d1ee

  • SHA256

    f6cf08d3a98a95c77655fa4fea07a7c41a19185159651d8e893462d9e7ccee07

  • SHA512

    863b1f114fcb4a0f440a54faa38d1335bb1ae060051de1ca1a579b37efb29c6305fe1fabdd0844879292f331f874d301b59373e0299f1375669a178c61958f73

  • SSDEEP

    3072:qKhiarU6Y+GH9jBR8FMYDkAetJ8aufhg8TYqCtG1GPcGzZwGB1hmmFVcqq0GnDZT:qKB8zB0ZkAetJ8auf7RCEcXNB1hmmFVG

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f6cf08d3a98a95c77655fa4fea07a7c41a19185159651d8e893462d9e7ccee07
    .elf linux x86