General

  • Target

    27b4dba0582cd45819385df0ed4068f71ac4fd0396549fbfe3b76205db3bd4b9

  • Size

    94KB

  • MD5

    1f89e9c588a64238a4072b32b531d1f0

  • SHA1

    7acf64e4650e5e534801ccd8962ba1f6c791372a

  • SHA256

    27b4dba0582cd45819385df0ed4068f71ac4fd0396549fbfe3b76205db3bd4b9

  • SHA512

    a9e6de0cadd47a08f9ce428c6bbd25e37d5dbb3017940e10ebf1ac9fc615c15c55f27823d330f09dd87dc8bbad60dac43a70a80fff9cf5962f2915aa3dff2bbc

  • SSDEEP

    1536:IECG+bqmHaFtLWSc/CqsWopIhF28Vwqsc/wTP/k9vmmiIVcqqzIGnOZT:b+Wmjl/CqsWopIemQgvmmFVcqq0GnOZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 27b4dba0582cd45819385df0ed4068f71ac4fd0396549fbfe3b76205db3bd4b9
    .elf linux x86