General

  • Target

    2f5cb015d37a40476415bacd5ef246b170b927916f52a413141ca48e99d2fccf

  • Size

    122KB

  • MD5

    61100970f17ff800aa693edca5590dbf

  • SHA1

    517ad2f91644710fbf3b1218110db98e19024d08

  • SHA256

    2f5cb015d37a40476415bacd5ef246b170b927916f52a413141ca48e99d2fccf

  • SHA512

    4854e115daaf0b683b6dfb315b4b045d1b0757d1cc540ff5816c11bfd52a0afe4ec8d4f72c2c07549450edb71e22573be42bc137625c5c7ef17e6664704e6ce2

  • SSDEEP

    3072:FSR0hK0Ju3BujXBBmdetJ8add9QzTsVz3g4mKcXeGcgqqK:FSs7RBmdetJ8addQG3g4mKcXdcgqqK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2f5cb015d37a40476415bacd5ef246b170b927916f52a413141ca48e99d2fccf
    .elf linux x86