General

  • Target

    17d77c20b9e16287258ff3bd1108c326838f11f3232b98ac0230183187f5585c

  • Size

    84KB

  • MD5

    c31bac5a2d1a561d5fb9da631990dedf

  • SHA1

    5206a74674b051d27251a75e06ba1c230ba7bbed

  • SHA256

    17d77c20b9e16287258ff3bd1108c326838f11f3232b98ac0230183187f5585c

  • SHA512

    5bbfe5eb4e521c0fa333ff12a96b9ac7fc9d811fd7efc2864b92a1ea3d41d007d8b6caeee9c18f36f83bfb9051b9d24ca4bdc1b3e8e61fecbb65e57bffab886e

  • SSDEEP

    1536:2hVO1e84+USWnO4RYItv/JHeHVDcUq5FzlKej0AwD4m+7ZVcaPXpEXZW:2h58tUSqJtvpe1DDGK7Z4mEZVca/pEXI

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 17d77c20b9e16287258ff3bd1108c326838f11f3232b98ac0230183187f5585c
    .elf linux x86