General

  • Target

    28198976016ab6cb2f4c6725009bb00387b6be202f6833f872b7e0f5af339476

  • Size

    98KB

  • MD5

    aff9332259af9a505027574b175de695

  • SHA1

    3d838ecad3bf31318d00b0a259e852be89973abc

  • SHA256

    28198976016ab6cb2f4c6725009bb00387b6be202f6833f872b7e0f5af339476

  • SHA512

    e038d15b10821186fbaa9056eb96d8e09016fa91983f0ceb0ae571c1585c36b9119ebe5e5c9b538ad53a19f4a76afc177824c81d6c82b64288e24a8c14fdfbe1

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqeBF1QmqoVcqq6GnQOT:heZyo5KqeBPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 28198976016ab6cb2f4c6725009bb00387b6be202f6833f872b7e0f5af339476
    .elf linux x86