General

  • Target

    11b2d114d86067226ee78be2bbfc2dcbb199ffabd29cda895a6942c4d97a73fc

  • Size

    97KB

  • MD5

    71950012ff5b996b04d2bb32e5473688

  • SHA1

    c377bf47e961178a5b4459e5be7bfa58abc7f1fe

  • SHA256

    11b2d114d86067226ee78be2bbfc2dcbb199ffabd29cda895a6942c4d97a73fc

  • SHA512

    4364f72cc715ebcecefcb711e9d1deee35825348b554c36e1df02a877bc1c4bab74ac2538b549392eeb3c24206721e225f70ecf32f91c005b0899bde1a0f1dee

  • SSDEEP

    3072:gjtwgA6UlYzZveohR9kIE0fdGZmmFVcqq0G27ZT:gjhzt3mIE0fAmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 11b2d114d86067226ee78be2bbfc2dcbb199ffabd29cda895a6942c4d97a73fc
    .elf linux x86