General

  • Target

    271b2d6f6781808daf63fc8137e936ffe4a2bf8d7e193d14b594105bd43ccd80

  • Size

    113KB

  • MD5

    6ac7e22467218d0b0597e6086bd4ff61

  • SHA1

    44665d6212dfa5d602889e5622d08b00b36589ae

  • SHA256

    271b2d6f6781808daf63fc8137e936ffe4a2bf8d7e193d14b594105bd43ccd80

  • SHA512

    06014a02eddc331325ff39130f5dba5abaf1d97a8858cea3908809919c38fbd96ae3fa1eec94e0df4dd6c7130d8d08f6be82b78ee38bd3472d6dd4159226ba48

  • SSDEEP

    3072:P98HdmvhFOq5PBSVjDW6CQbN7w68E97JEKPt7/j16WrNntEpaEmST0nYXbg1DE:PuHcN5PBSVjDW6uNu1EKPt/j16WPWaEL

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 271b2d6f6781808daf63fc8137e936ffe4a2bf8d7e193d14b594105bd43ccd80
    .elf linux x86