General

  • Target

    bbfe028902b7999ceea3a9c64fa9872a708434777c9efb6adb85b7bc8794b0f3

  • Size

    97KB

  • MD5

    ef8f8dbaaea175d3859827198d9cb35e

  • SHA1

    cf5921ef006d1cde2cd6e3ab139a90a66b02175a

  • SHA256

    bbfe028902b7999ceea3a9c64fa9872a708434777c9efb6adb85b7bc8794b0f3

  • SHA512

    515fb9cd271d5ac4c6bd918f86ee56d88e4f005f3caee0858c0946847fe1dc19226b91b2760a6b4fb7666b5c87cb79ff03cd00015f57d7292c98d79246ec6ce6

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogAEmmFVcqq0GnDZT:VK7DDeKlogAEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • bbfe028902b7999ceea3a9c64fa9872a708434777c9efb6adb85b7bc8794b0f3
    .elf linux x86