General

  • Target

    28e8e6e644591a33c7823fdaf9ede4ac2377b8c258588ca9f0371657bfba6fad

  • Size

    95KB

  • MD5

    7b3369b0ba39146e51169134f564511b

  • SHA1

    c1edc5d270d486c4c29025737399f0c43d106fa1

  • SHA256

    28e8e6e644591a33c7823fdaf9ede4ac2377b8c258588ca9f0371657bfba6fad

  • SHA512

    b087101a35449408b0b5362e3facfe9628fc918c46aef7d4eb17f66160b155a15d6d494efb381e0135da0136f8474a71032b31032e727252af9f63fc39552fd3

  • SSDEEP

    1536:E3XRaxE9mwP7EVjZWfRKOq3p1WaigWNssHQBCBkAZ99tD5hT4YMdVJWimHZSDt7C:ERqE9mwP7EVjZWfRfAWfgWNssHQBCBky

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 28e8e6e644591a33c7823fdaf9ede4ac2377b8c258588ca9f0371657bfba6fad
    .elf linux x86