General

  • Target

    28fba7843b969a03bb8b8d962ad825ac5127f3b5e8306d2c087759c5b7900cb6

  • Size

    80KB

  • MD5

    46bd5f23cb229cd82aea05df3b383156

  • SHA1

    d29f961ed7d4d48278653aad68da96b1006e20d1

  • SHA256

    28fba7843b969a03bb8b8d962ad825ac5127f3b5e8306d2c087759c5b7900cb6

  • SHA512

    e82667a6244aadaae7e64c5eeea6d5d8d35441bb7b0c0db4f2dc446e3a965c3ca097d65d5592e6e8251cad0e2c603376a4a6f18c5f947157086330de60bab69c

  • SSDEEP

    1536:0bZ94SJPZUoU3UL2UL3ufOPnSRDu7lB7U7WVpiRmbukyALisKris310OzTPC+jWv:69bPZUoU3ULtrCOPnODu7Xg7UUkyALi0

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 28fba7843b969a03bb8b8d962ad825ac5127f3b5e8306d2c087759c5b7900cb6
    .elf linux x86