General

  • Target

    29c17e3311b10fd1bb81ea5c457cd4d73450c84ef772ca87505412ebbff09725

  • Size

    71KB

  • MD5

    8702eaec8de846841d47c1f26278a75a

  • SHA1

    9dd94759862db26af30c1bdf5a295cd6eb0f7c6d

  • SHA256

    29c17e3311b10fd1bb81ea5c457cd4d73450c84ef772ca87505412ebbff09725

  • SHA512

    6ca61d75a26df3208b72ee7b8c9af8b318303ade6c2679220a6c10b1510be26e180076878cbbec5f5b9c4db64ad7f9de0cbbbe5fd1cb98132ca296304f00426a

  • SSDEEP

    1536:Ugj8akm5NeWicipWl6MwakvA5Buc5iFq5bmLI2VOCjXUfJRk:D8ZK1VWWl65Dv0hiE5bmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 29c17e3311b10fd1bb81ea5c457cd4d73450c84ef772ca87505412ebbff09725
    .elf linux x86