General

  • Target

    90b12ea7345edbaa1ef43ee4531f2e154da9301cffed781bc879ecd8346c1b9a

  • Size

    101KB

  • MD5

    0c5c1df4346f2aa0e04d391831a828dc

  • SHA1

    115c42f58e3169a4a5ce12bf1b25204e6a51992a

  • SHA256

    90b12ea7345edbaa1ef43ee4531f2e154da9301cffed781bc879ecd8346c1b9a

  • SHA512

    e96fdd6a49388fac53e1ad2a9c3e2d858beee3e5e92a9d544595641f16f5804a2170f8af9279170bdef65b136c30ebb014f88f1e6cf3a9a7e319bf84d7348404

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fzHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fzHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 90b12ea7345edbaa1ef43ee4531f2e154da9301cffed781bc879ecd8346c1b9a
    .elf linux x86