General

  • Target

    2829006deeee091424a2e2680517c7ab874e83fd0874796e8a9c74ec17670d67

  • Size

    89KB

  • MD5

    8b35a162333d83ce654782ee87832ff6

  • SHA1

    2d0c7b0033c63e6277700ae0f73486571383d854

  • SHA256

    2829006deeee091424a2e2680517c7ab874e83fd0874796e8a9c74ec17670d67

  • SHA512

    a42b27845eea11157851f36b384dfc94716aff4eaaaee8eb13c99814008089461816caf2e60c72cce681c6755b04791bbbef022bc701118bb425d67a53b2a001

  • SSDEEP

    1536:7OFHxQ3beG+GJSKWwM6qXMrqLlsq3uTQ5hh7OJs1Wshe0QzUzJYQ2Wk:0UbeG+UCn6qXMrqLq705hhxWUe0QzUFU

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2829006deeee091424a2e2680517c7ab874e83fd0874796e8a9c74ec17670d67
    .elf linux x86