General

  • Target

    dffd3f176b9f2653a1b4cae34eff431f63418483ffc79f3decb432f83d46fe42

  • Size

    124KB

  • MD5

    cea5e95f7b7277f5f3fa9ede4d6adeaa

  • SHA1

    04f71528d81cb88e2fc73ec8ad8f906112db6aa0

  • SHA256

    dffd3f176b9f2653a1b4cae34eff431f63418483ffc79f3decb432f83d46fe42

  • SHA512

    fae13595de8959327c4a5f297d51b1b829cdb74857af6a35f8a587342236b614d8c69ad2211e3b08ceafa688961c99273cdd3b23bbdb8998d7244b5092ffe04f

  • SSDEEP

    3072:AqqfSgF1f0UVVhNjiYNAvOQpKrKNGgEDLov4vDfGawpP:AqqfZ02hNGrHkKNqDLov4vDfGawpP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dffd3f176b9f2653a1b4cae34eff431f63418483ffc79f3decb432f83d46fe42
    .elf linux x86