General

  • Target

    17f38a07979223a424db64b44db6395cdc144ccc7d0bde2d6bcff6813c1934ed

  • Size

    113KB

  • MD5

    906cdff2b3e2fff2a9e55142dc153362

  • SHA1

    bd32325bd4de0cb25e730b13f0ae9099101f136f

  • SHA256

    17f38a07979223a424db64b44db6395cdc144ccc7d0bde2d6bcff6813c1934ed

  • SHA512

    b036b5f0aa489e527bf4c0fcc409905231573d0dec190a8bca019d9fe6bc491872ac67bd62dbe0a796f896b808eed6ceb637174bc326e8f87820a6bf110107a0

  • SSDEEP

    3072:D5nw7F7X3tzkcjtpetJ8add9QzTsHLgx3t64WGEgMqc:DeHtjtpetJ8addQ8Lgx3t64lEgMqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 17f38a07979223a424db64b44db6395cdc144ccc7d0bde2d6bcff6813c1934ed
    .elf linux x86