General

  • Target

    1800f0ade70e370d97dbab95692dbc168af1e6f468b8204f4eee0c2aa508b937

  • Size

    122KB

  • MD5

    1b6b8af217cf82cec12de31b1027325c

  • SHA1

    d79b79393ad319f66a3f53ffe396e03a5716be0d

  • SHA256

    1800f0ade70e370d97dbab95692dbc168af1e6f468b8204f4eee0c2aa508b937

  • SHA512

    b13d1dc4010cb6f807a4ee18b907922c930962064362610e4b19780b03bb8556b1c321a13afb56935e0c3dce90e00f47564900b81ca4825be062aef7738edbdf

  • SSDEEP

    3072:Jm1sYwWSN8uYvg1+NyretJ8add9QzTshbnt4NKcXeGcgqGK:JEZcooSyretJ8addQWnt4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1800f0ade70e370d97dbab95692dbc168af1e6f468b8204f4eee0c2aa508b937
    .elf linux x86