General

  • Target

    287fd99d4436947f432a7e92afe2206b0a724dbf79f8796fd548fb9570a3f1b0

  • Size

    109KB

  • MD5

    1c6ba227928d7babefefd4a6adffd2c8

  • SHA1

    0ceeb6a083f18ad7abe674ed88f0ad2ba3d2851f

  • SHA256

    287fd99d4436947f432a7e92afe2206b0a724dbf79f8796fd548fb9570a3f1b0

  • SHA512

    b9c2985df6231199e1a3480eeeaa7a8ccd79d8f7dd3544b76da37c41d0dcda98f0e3237628b8115f13050ef0a82ef3072546d7a59504896c50dc18f2d0ce07a0

  • SSDEEP

    3072:FhGIQFGv9K6jFjjS0gpghhDCCWAzZy5QTDSTboaBmST0nYXbg1DE:bQkv9K6jFvS0MgSKzZd/STsaBmST0nYv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 287fd99d4436947f432a7e92afe2206b0a724dbf79f8796fd548fb9570a3f1b0
    .elf linux x86