General

  • Target

    ad806e6bb1d45af024c804d283f45c1a4f8ce63b2af1e332ac6453d5e43943f4

  • Size

    102KB

  • MD5

    3b609737aa68a7b318b16d3a0dfb0110

  • SHA1

    71bfba09dd7f5aef3d1aa52ce59628378dfd3d00

  • SHA256

    ad806e6bb1d45af024c804d283f45c1a4f8ce63b2af1e332ac6453d5e43943f4

  • SHA512

    8bb418d7ebd97998fff3341fa927b38bad28fb5f072a261118c4361a017c1a594fb4c883bbf1e5af3a0584a3ff4b6ff47a545b9599f463ca8fed1d999d4458c1

  • SSDEEP

    1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV9xqLS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgaDmswmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ad806e6bb1d45af024c804d283f45c1a4f8ce63b2af1e332ac6453d5e43943f4
    .elf linux x86