General

  • Target

    29504c6f5d42ab545f78e155f4c429d14a5b218c9ebaaf93946cf5db0bb50205

  • Size

    98KB

  • MD5

    15e735df605b4257359a724731077fe5

  • SHA1

    2c4b589867eca42aff0b07995cc271134c075ff0

  • SHA256

    29504c6f5d42ab545f78e155f4c429d14a5b218c9ebaaf93946cf5db0bb50205

  • SHA512

    78f4212cec47acd5b50794129d5fe9463cad276ff93a3d16817672c043fe57627ac896542e2b8c1bee94cbfceb9660314dcdc9fc39514227d1b88ebe881d2601

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKq2MF1QmqoVcqq6GnQOT:heZyo5Kq2MPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 29504c6f5d42ab545f78e155f4c429d14a5b218c9ebaaf93946cf5db0bb50205
    .elf linux x86