General

  • Target

    2a7bb306916b37dfc31634a9db201e0a92377e9cade053887be9b68640329b58

  • Size

    89KB

  • MD5

    9de90d7de2d894318141ca6424cbbc0c

  • SHA1

    0936d3658c6429602b25e45e084ee10df413fe5d

  • SHA256

    2a7bb306916b37dfc31634a9db201e0a92377e9cade053887be9b68640329b58

  • SHA512

    08cd601970134341cd049aea03e0a5194dfb3668be756e768a9fccff9fd3b6e21c0726b793d029e813e452a41b015ae8bb26abd2fd226bf078b52b18274a0a89

  • SSDEEP

    1536:UDKzcGXDeQFT46gLJWJ+mKkuOTAX4zWHXsrdgMatK0tc4POGEg0qc:7TdFHvYmKkuOTAeW2gx3tc4WGEg0qc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2a7bb306916b37dfc31634a9db201e0a92377e9cade053887be9b68640329b58
    .elf linux x86