General

  • Target

    1741c7cc8af31355a9ba67d09780534c9d240fd1cf82be89c80fc01cb8d7da1c

  • Size

    80KB

  • MD5

    a62ab005f1ddb55953ca20088935cc04

  • SHA1

    fd60f2a7e73d09b2bcd73581db09aa0528fadd0c

  • SHA256

    1741c7cc8af31355a9ba67d09780534c9d240fd1cf82be89c80fc01cb8d7da1c

  • SHA512

    6c6026a7347977ab09c136bb4d008f64936e2bc07e3d011dfc33ab72237a10984b5cc82174ca74db364134ec57a3a0494ef2eef16f36a466c314ac20779a2eb3

  • SSDEEP

    1536:xSqbqkZ12Ue/Wz/P9ZhxUzi+8F0p32cBNh5hlQQ45Dis3r0OzRPF+jHeN:xhbf12Ue/WDP9xUziB6pmc5hlQzJimrp

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1741c7cc8af31355a9ba67d09780534c9d240fd1cf82be89c80fc01cb8d7da1c
    .elf linux x86