General

  • Target

    691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519

  • Size

    97KB

  • MD5

    321d13888b1eebda0b5ac6faff67113d

  • SHA1

    70bc11dee680afc8ce17900f96efc7a1f7cb7b4d

  • SHA256

    691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519

  • SHA512

    56bb2790c3718656faade314f063b266931f108706757e31a9c757d1b24f9109c2ae8c7c672b5d86990eee2261566c4bd8a3d2d9e9c6ca3441aecde3a65eae65

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogNqmmFVcqq0G27ZT:VK7DDeKlogNqmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 691d4520f643ad9cdfdd55470ee5b6d4c72f833e3a27e5f1a798897e23c9f519
    .elf linux x86