General

  • Target

    2a4918ceef172e3d7103c156d866aa16e27ef12c5d1370a5b88bebe59b9fb793

  • Size

    97KB

  • MD5

    8376a3c36dff98f12fafa59c5156b4a6

  • SHA1

    44c0d3adcae6ead799ef175688ec42f0a84acca7

  • SHA256

    2a4918ceef172e3d7103c156d866aa16e27ef12c5d1370a5b88bebe59b9fb793

  • SHA512

    fa55e500a66bb2e10e34d42d5ade60a1992cdb7ee95d5b18f104877708722452fcc1b2716a8af852102c35e55c3e94d11e1139d3026ecc05b8bc6a94711aaf4c

  • SSDEEP

    3072:gW+xN94avUAUhYrmjRsPrkCXeOXc5hiHPsi0Yvz4aXl7L:lWv55iOTPPXc5hiHPsi0Yvz4aXl7L

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2a4918ceef172e3d7103c156d866aa16e27ef12c5d1370a5b88bebe59b9fb793
    .elf linux x86