General

  • Target

    180ffbed5290025919cc1693c6c3d8532c1756a0a64aef0f6f62691cbc9e8744

  • Size

    109KB

  • MD5

    d8a9551c4ed3abf7e6c1c19aef53bbd5

  • SHA1

    4dbde4a2855b19ac6719b95fc529793710cba64b

  • SHA256

    180ffbed5290025919cc1693c6c3d8532c1756a0a64aef0f6f62691cbc9e8744

  • SHA512

    e93c201660afca65f02cfa4f6aa6bd5a37ea1b0c39102290af00421fa9b439afa534c37c1cf1e488f81806ecdf9b05e66c05d3eddce739dff52f51d0e25e915d

  • SSDEEP

    3072:oKCEaFMbSbDZagPQhcPFAwcuFwsQznVEmST0LMBbgwIv:opEaFtPPsw/FwZZEmST0LMBbgwIv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 180ffbed5290025919cc1693c6c3d8532c1756a0a64aef0f6f62691cbc9e8744
    .elf linux x86