General

  • Target

    18080c3ec877e32cd272aeaac6f2e07e2ea84e2508c4eeb81cb2c94843ad9ab5

  • Size

    89KB

  • MD5

    53ae2dd96e2745ef42f6ad2910e571f4

  • SHA1

    f08b3246dc1e17566c3fead2b22a5a09ba8e4a32

  • SHA256

    18080c3ec877e32cd272aeaac6f2e07e2ea84e2508c4eeb81cb2c94843ad9ab5

  • SHA512

    828235cbee3bb22f7324c675b1e75dd836e94b0e03cbd50cd16bd0f1e7dd875804e4a0e1a01102012000e507fe4fa2a9c1f86c819d31ee4f35e01b3bb8ee6e4f

  • SSDEEP

    1536:Bsh0T0mzR65U0+fwieWRBmUwlJL61b35Fl1yKdQHtMatK0tc4POGEg0qc:+h2FYU0+fwKRBmRlB6pZ1Itx3tc4WGE9

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 18080c3ec877e32cd272aeaac6f2e07e2ea84e2508c4eeb81cb2c94843ad9ab5
    .elf linux x86