General

  • Target

    261202a403c9177eaf58331dc0c386158b24fa1f5365e13de4ab374b10efdb8b

  • Size

    98KB

  • MD5

    720bba8499e21988019211d4b265f9f6

  • SHA1

    2c3024a3b381bc76ac05591eb6bafd97413d0371

  • SHA256

    261202a403c9177eaf58331dc0c386158b24fa1f5365e13de4ab374b10efdb8b

  • SHA512

    4207be23913c27ea4a76e73470e5567f415089d356c137692f9820f665b92b3506ab550886bfe9ded0d23835ec930ba133f1c795338ae1f5dc168ccc695d6b33

  • SSDEEP

    3072:he7EqekUHfPyjRJ9rBFKqk2F1QmqoVcqq6GnQOT:heZyo5Kqk2PQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 261202a403c9177eaf58331dc0c386158b24fa1f5365e13de4ab374b10efdb8b
    .elf linux x86