General

  • Target

    2ff642c6bab4e031a795180b9d73c02985d90f658fbd8e2249d4809a2f536529

  • Size

    105KB

  • MD5

    33a1a34bd8cc41438e20925d855bff79

  • SHA1

    1dc95f4ca3a8c009464126507df388ab2d91e3f3

  • SHA256

    2ff642c6bab4e031a795180b9d73c02985d90f658fbd8e2249d4809a2f536529

  • SHA512

    f19f11626fcf837fa8f4b019bf9431ca7b8fdf404128e6b382964bb49732ed4db185a514c1bc5618b011d8fd23bcbc0f05312a05e71f7e280b71c13d364a6aaf

  • SSDEEP

    3072:4V6QCSledP9yftR/R6Bs2JN4RW4v2ne+cBmST0LMBbgwIv:4uFd1yLWs2tVcBmST0LMBbgwIv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2ff642c6bab4e031a795180b9d73c02985d90f658fbd8e2249d4809a2f536529
    .elf linux x86