General

  • Target

    2fc5a05f9e1590c0e25608374fa254262ce7d327a8aefea0862597e4fedc3eb4

  • Size

    104KB

  • MD5

    e00d199cfd987d1b0587ad1663c73e54

  • SHA1

    be5367fee184cc892c4dfb2585fc48ba60c2f7fc

  • SHA256

    2fc5a05f9e1590c0e25608374fa254262ce7d327a8aefea0862597e4fedc3eb4

  • SHA512

    8c88fa9267d171ed6530fbd86c41fd734bfc9945277d7e98191a47905a12827ad324ee4951641a3ec60e3fe033b20d1892334cdd4823707751bd8d6ed1a15153

  • SSDEEP

    3072:vtTBo4M19FEIpolMHULQvpymqlXchQVIaWmM:17efULQvEmqlXchQVIaWmM

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2fc5a05f9e1590c0e25608374fa254262ce7d327a8aefea0862597e4fedc3eb4
    .elf linux x86