General

  • Target

    27e94d603d264e8c0917dc699061459ba265bd2608f843dd5e555344c6ed890b

  • Size

    139KB

  • MD5

    dc7654045ad38e2a407e77bc9658a22c

  • SHA1

    7d9d90e1b56ad781a7ad3aaa6d1ae439499b1619

  • SHA256

    27e94d603d264e8c0917dc699061459ba265bd2608f843dd5e555344c6ed890b

  • SHA512

    064f9cbcfc0e75cefdf510922d6c361dbfe42a86f77368e9dc3db91a27bf9f7e690bc7d06811c6757ed1c9b54ce6d31c2428500b2a5313922353c8170ad01e93

  • SSDEEP

    3072:/qGuqVIs8UrJuZcfQfx9/oxvjcofJ6EDHziH90PcZsatph1:b2mv+joxvjl6E/iH90PcZsatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 27e94d603d264e8c0917dc699061459ba265bd2608f843dd5e555344c6ed890b
    .elf linux x86