General

  • Target

    275177daae0ba4e329475188b661d7c321315d5a104dd4922941a0a673599bac

  • Size

    102KB

  • MD5

    88b97090421e7cb4dc1be98c0bd796c3

  • SHA1

    1a8a5298df9dd421dcf0cc3624bf6964924b4eae

  • SHA256

    275177daae0ba4e329475188b661d7c321315d5a104dd4922941a0a673599bac

  • SHA512

    9686d4be82b9d096acec50b3108ae28abc4f6163cbe9062c6932efad503f0bf3a08663c6a70d504bef060576dd3802adb7c54c615cde4e45bd8dc737795069ed

  • SSDEEP

    3072:Ic+yzCdpMrrmgy7Uqss/DB63XkxhFj3TOFs72oyNdc3Ct:Ic+AUpimgUwOw30Njjl72oyNdc3Ct

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 275177daae0ba4e329475188b661d7c321315d5a104dd4922941a0a673599bac
    .elf linux x86