General

  • Target

    17cd41f3e1a4645412935324e36c79f303e0f2c5f376599fe0e124beea441b50

  • Size

    113KB

  • MD5

    093969d869d03bd4e9d06d80648810dd

  • SHA1

    f653e7ca65116b50124384438a147f0811e53aaf

  • SHA256

    17cd41f3e1a4645412935324e36c79f303e0f2c5f376599fe0e124beea441b50

  • SHA512

    f7ea26cb401fc7094823c11701c2e1bfd962298d54387acd32dd6b5a929d4837b1b07e91186e785db93b88cc7b2235c1139451091694129bc1cdc260a89ae684

  • SSDEEP

    3072:+oYYUNqD9taPtMFxW6IetJ8au49QuTsF6s4pEGIDtxAtc4kG7gyqc:LXJM+XWnetJ8au4lC6f+ttxAtc4n7gyv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 17cd41f3e1a4645412935324e36c79f303e0f2c5f376599fe0e124beea441b50
    .elf linux x86