General

  • Target

    270cce04a9a902cd13457ff452f8cf5bdbeebfdbcd3b21ea25aadb8f8cd51770

  • Size

    74KB

  • MD5

    2a723328248128f52d13365fa2aba690

  • SHA1

    917b09a80a8deec31e7c73be702b204bb7c3a241

  • SHA256

    270cce04a9a902cd13457ff452f8cf5bdbeebfdbcd3b21ea25aadb8f8cd51770

  • SHA512

    897f1c4c7601ea5cb1712af548f9a83cd043c10894f801009d3a96ddff8641f86ded66725d56f6ce120272d48623e6a40a7e8dc2bc45bca0cfec000a0362385c

  • SSDEEP

    1536:XEteFG36U7HmaVWFMs28ewf/e08vlGkA4OqzkpPxBXk3tPO568m:XEtRmhKsrewH98IkA4HIppBXk3ZO568m

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Identified Kaiten Bot 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 270cce04a9a902cd13457ff452f8cf5bdbeebfdbcd3b21ea25aadb8f8cd51770
    .elf linux x86