General

  • Target

    179a8afd9b1aff3499faa6755ee2189f2b5f945f332eec214e62890761eab0f0

  • Size

    98KB

  • MD5

    bfa38c59ea7d71edfe871305ea32b13d

  • SHA1

    d0742a6c07959cbbb3079dc6845f109fcbe11a6c

  • SHA256

    179a8afd9b1aff3499faa6755ee2189f2b5f945f332eec214e62890761eab0f0

  • SHA512

    b17e598dfc584f2bbccaf4beca3a9858046e3d6a99dfbc9e8de168f8783238f570d89b18f3af491cab91faa7a2ff37f59d106a0cdcba4d4057fab22c82e6f2fd

  • SSDEEP

    3072:K3Z7pZf6yG2i5HLdnxYOi9n3dsm4KKcXuGggYBK:A8DxhdxYZ3Km4KKcXNggYBK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 179a8afd9b1aff3499faa6755ee2189f2b5f945f332eec214e62890761eab0f0
    .elf linux x86