General

  • Target

    2965bcc08f5633316e7b4ae300df4afc2391cdcd869ec4ddc65999b0408e273c

  • Size

    98KB

  • MD5

    017f10b6d2fdcb88f46637df02198e54

  • SHA1

    f30f71f506f69c924df89b749fefbaad84812d52

  • SHA256

    2965bcc08f5633316e7b4ae300df4afc2391cdcd869ec4ddc65999b0408e273c

  • SHA512

    f13b3ea2504d5046b4d603f81307df00940210c726f42dc5c07f41fba990715869052ed9f259fc4a8981b2540fde736e3e94f974daa6e659f61832b3321bc958

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqjbF1QmqoVcqq6GnQOT:heZyo5KqjbPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2965bcc08f5633316e7b4ae300df4afc2391cdcd869ec4ddc65999b0408e273c
    .elf linux x86