General

  • Target

    c7bc8053da244cfd04d76e307ffa1d594e5611df988229c4d682b62002ff9387

  • Size

    74KB

  • MD5

    f7e2dc7915cc3f085d67a3d2ec88838a

  • SHA1

    eda180eaa2d7a51fd9109e6424b095f1145cb1d9

  • SHA256

    c7bc8053da244cfd04d76e307ffa1d594e5611df988229c4d682b62002ff9387

  • SHA512

    e2543c99e42b7ecffe68a9125ba6506a1c41430c460fefea3badd49d397fa446394dd8a8e808712009891b18b4de3dcfc1c41127cf01f4fa9ac25e1bd9ece35c

  • SSDEEP

    1536:Rs03/vUWUuhxZksfzb+IpthqAoh7aBWJLsmu+kvmLI2VOCjXUfJRk:e03UWUkxasfP+IpLvolhJixvmU2VOCbp

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c7bc8053da244cfd04d76e307ffa1d594e5611df988229c4d682b62002ff9387
    .elf linux x86