General

  • Target

    2f84a4ea9d00e85bb26f938f76440ef6f6c7c1f2e0d8fb486c91fe5d5ea97931

  • Size

    148KB

  • MD5

    6301cd1b1d6107c0ae6fd97b33ee1616

  • SHA1

    e70e5207db759eda7d6541f302b7f653e21014e7

  • SHA256

    2f84a4ea9d00e85bb26f938f76440ef6f6c7c1f2e0d8fb486c91fe5d5ea97931

  • SHA512

    c4ca6c6a720a1b0bb2648f584c82676c59405a5dc1b985b467fa10cdc18e6679bbb22a06aa1b61a3a05024e24c7606a6b9dbe57704831f2d2f1933083732487d

  • SSDEEP

    3072:HyZ/lm1dUnle11pZkpJqRDOlVGgPlh7oZpRwWriH90PfNatph1:KeOGECRqlNdGiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2f84a4ea9d00e85bb26f938f76440ef6f6c7c1f2e0d8fb486c91fe5d5ea97931
    .elf linux x86