General

  • Target

    2fc9389e1f0b68ac52b8265e5b69b93961ff35b2ffca2e403fc2b793e464cf3a

  • Size

    98KB

  • MD5

    36d5c62e3d588ce44639996139d93c98

  • SHA1

    e3fffabc566d1e85908fe6577c5b7cd4942f35ee

  • SHA256

    2fc9389e1f0b68ac52b8265e5b69b93961ff35b2ffca2e403fc2b793e464cf3a

  • SHA512

    23c492ab770a75d9986a14f5d113de131526ce5a6c00acdcf4901b14a67117eab14435fa665541ef05180ca36e415e832ff18494dbfa31057d898f6bc809d728

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqeeF1QmqoVcqq6GnQOT:heZyo5KqeePQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2fc9389e1f0b68ac52b8265e5b69b93961ff35b2ffca2e403fc2b793e464cf3a
    .elf linux x86