General

  • Target

    2f6bb9af9e01fe9166d6dd1301745d19274c63db593afd3598547938532c075d

  • Size

    128KB

  • MD5

    24a9e1b306362d441e90260766f84018

  • SHA1

    7700ac6e5f6784e11e043386b4ed99a675ebb851

  • SHA256

    2f6bb9af9e01fe9166d6dd1301745d19274c63db593afd3598547938532c075d

  • SHA512

    ac388369dc57a1d3434674dcc1f685b71f20c3ffef074b1bfc93ac7ed9a2c73c26a534ef50c2bef26707cd1637e42abee77f2424e7edbb04635a04c49bc96314

  • SSDEEP

    3072:st8pzReTk6/W8409dw86etJ8ajlvwigrK01NiG7cq0t:st8pCLddLw86etJ8aZvvgrK01Nh7cq0t

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2f6bb9af9e01fe9166d6dd1301745d19274c63db593afd3598547938532c075d
    .elf linux x86