General

  • Target

    2f6ead105a8645a4059ae9a812d73abb9998ddd3e8eafed2aa08f28bdb48ed00

  • Size

    86KB

  • MD5

    b1248a088522c92fad58acce09f1a61f

  • SHA1

    b7059e9dc566102ff6777ae059d5bddcd47b49d5

  • SHA256

    2f6ead105a8645a4059ae9a812d73abb9998ddd3e8eafed2aa08f28bdb48ed00

  • SHA512

    3ad801920c62729aa58ab482e199d115fbd135cd90e1623f5a15a48a0fe5f2d193509ea1c2d0ab2939b9b086a182cbf1fac74dee8b6ac7bfbf792464965585b2

  • SSDEEP

    1536:t4bEkJH2PUz0NVvtpFDdgFJiX36aXAA2s5hCsddq0W7she0QzUzJYQ2Wk:qbdoUArvVDdQJq36K/5hCc87Ue0QzUFU

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2f6ead105a8645a4059ae9a812d73abb9998ddd3e8eafed2aa08f28bdb48ed00
    .elf linux x86