General

  • Target

    2e7b4686ee6dc87fda2c3fd460623f57dd1cd4775c7b576da092ee4f9479b539

  • Size

    107KB

  • MD5

    5b17d3df74760f2fb0912991142eb11b

  • SHA1

    9b2febdae3a5555c3fee36b2689c82e6054d8ba9

  • SHA256

    2e7b4686ee6dc87fda2c3fd460623f57dd1cd4775c7b576da092ee4f9479b539

  • SHA512

    1c5c0ab87421babde2d7158def7797bb7594723e505f60896307725031f82b20b930fcf1d90b61fd99cad08517ce04eacef70f76aa862e286241619cef6e2630

  • SSDEEP

    3072:SJA9wUyJL+RFxaBd/VKYKf9ms5KPsYIovkdrE9hWaM:S8w/R+RFcUes5KPfIovkdrE9hWaM

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2e7b4686ee6dc87fda2c3fd460623f57dd1cd4775c7b576da092ee4f9479b539
    .elf linux x86