General

  • Target

    d670428984a41a76e8f12aa981ce8399db34ffb74f4ecb9de145b319d1b30277

  • Size

    114KB

  • MD5

    d0f1ec9356fb23b8cfaf65a84d12fcd6

  • SHA1

    11bad16483b4b98c0ad178d6303de6de761327b2

  • SHA256

    d670428984a41a76e8f12aa981ce8399db34ffb74f4ecb9de145b319d1b30277

  • SHA512

    5a8c1299dfe3b368452dc401a05bab3df27b127ec7a3ddf328587232222183523df34c0ae9af73d816c2fba938d68ff996b0f1cca256ae7c35f45ebba8936dfa

  • SSDEEP

    3072:FfKnO41zFUnDOHj+PC4saH36IM1GuemqF5cHtc36H0h:FfIO+WDQCSaxM1GuemqF5cHtc36H0h

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d670428984a41a76e8f12aa981ce8399db34ffb74f4ecb9de145b319d1b30277
    .elf linux x86