General

  • Target

    22c792383beec57d3377bcb7c28d01ca603355e094999195001d0807b4573656

  • Size

    85KB

  • MD5

    4c6fcec2eb57a9e4fb21bd110e164270

  • SHA1

    5e4d99e4573ca4f62fcdf539a8a629ddd80ed257

  • SHA256

    22c792383beec57d3377bcb7c28d01ca603355e094999195001d0807b4573656

  • SHA512

    95b441c581ca2dad2f109677a166f8c3c0c5c38ddbd0348f620ce66c1ce8111c6b149dcdd210fc07bfef7fa9f76c72f6c1a65e35a33fedf7a560e2e171f63891

  • SSDEEP

    1536:X4XEAbUgUENUzorrMopIOvXceEQ9E3+MKA3Y5hyYF4+7she0QzUzJYQ2Wk:IXTUgVUcvM9OvseE6E31c5hyYN7Ue0Ql

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 22c792383beec57d3377bcb7c28d01ca603355e094999195001d0807b4573656
    .elf linux x86