General

  • Target

    301fe881a03658a38bf987c05346f7a20aa8d097fa5764feca1443fede7dff71

  • Size

    97KB

  • MD5

    ffd1646c27bda75c8700c319e8653536

  • SHA1

    c854f1f3cc5ce8122eec5bbc806922c929f40259

  • SHA256

    301fe881a03658a38bf987c05346f7a20aa8d097fa5764feca1443fede7dff71

  • SHA512

    086ef4c5298439957d2f5d751e4378c6c211ecbb19eeda6aaecd0fc969e4b835424d1c892f7b7463651e3e4b395971693bccc9df4d582b49701b1847fd1f24ae

  • SSDEEP

    3072:NfKKKPQP39VjGWXF8T7pV7EGytVd5hgTObFXnf0OzTyoQQub:NaQP39VjGWXZ9tVd5hsEFXnf0OzTyoQ7

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 301fe881a03658a38bf987c05346f7a20aa8d097fa5764feca1443fede7dff71
    .elf linux x86