General

  • Target

    23003bcf24f1fb9b34520954306a546ef439169c529f3e9713dcac0dd285b292

  • Size

    128KB

  • MD5

    d472e93b8850cfa71e10f96b4511aecc

  • SHA1

    866ea663bc981f5cce961120fa318e68a8c63ae0

  • SHA256

    23003bcf24f1fb9b34520954306a546ef439169c529f3e9713dcac0dd285b292

  • SHA512

    9f7047f72026285ff5e19b2e58e2462d2ce282c98cad4a375a4d3e5bcb5736675ecedac11df5cb4ea5628f128cdc6a4bc87296d25a3ac861798756dae3712bc0

  • SSDEEP

    3072:ItA8iRAWNj/r3on+/dgbcM7PC77dHsD9oY4giAGaJpP:4A8iqWJml9PC77GD9oY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 23003bcf24f1fb9b34520954306a546ef439169c529f3e9713dcac0dd285b292
    .elf linux x86