General

  • Target

    29fa5f5b225854c526c7bccd61df1fe7c30d9da39dc218da7a3af8d54e436846

  • Size

    92KB

  • MD5

    1ed1300ccc97c74320344c57d93b82b0

  • SHA1

    0da3a99e6a93219073350c176e775f260e1ee7f0

  • SHA256

    29fa5f5b225854c526c7bccd61df1fe7c30d9da39dc218da7a3af8d54e436846

  • SHA512

    dfe80f9f6151db3d77c5d3131939eb502da0b6f01e72bac3fd9d4b8de10548d69198c9469b61faa00ebff66f47ad1509f727f690cf6a6a95ad280f9dc1dbfb9a

  • SSDEEP

    1536:0WbDP7BRUVU4e/izb6C/Qdk5cc/z4d7J2cNU5mZ5h0V7w882PM37K8PN2UrYe:Db/LUVUTqbpQdScc7M7JFp5h0Jw882Eh

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 29fa5f5b225854c526c7bccd61df1fe7c30d9da39dc218da7a3af8d54e436846
    .elf linux x86