General

  • Target

    17875fbcfcdb86ee395cfaf463e95208f412142e2edfe9c247fef8728764ef58

  • Size

    112KB

  • MD5

    79545b1f937ee5edbdbb1f3173b33414

  • SHA1

    9d064cd7d0827fdfa5d613299071e8a881446374

  • SHA256

    17875fbcfcdb86ee395cfaf463e95208f412142e2edfe9c247fef8728764ef58

  • SHA512

    9d5a90d92a8f867187d6b449c742e97f98e3875a6b1cebfbe5d819c68d52bb6e0dba12f744a130cb2e2b40041499760cc4bfd4b8bbbb10bd878630228e13dddc

  • SSDEEP

    3072:DYE+8P09N+wa/gyeDSm4CyCI4O1fDZML4CNTxhkMR:DYE+WYEgT4CyCI4qDZML4CNTxhkMR

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 17875fbcfcdb86ee395cfaf463e95208f412142e2edfe9c247fef8728764ef58
    .elf linux x86