General

  • Target

    1fbd2f68f3d6ab495df6869b5b68f692cd304ed3a67f4e582789c47323afb8fd

  • Size

    97KB

  • MD5

    338dd77c2a8c8c05e94fa1694fa27698

  • SHA1

    a655fa6445cdf662049b482c4803d360dc30052d

  • SHA256

    1fbd2f68f3d6ab495df6869b5b68f692cd304ed3a67f4e582789c47323afb8fd

  • SHA512

    d7894a54ed9fe8ed201ab56fd6c7833d1adcf5e0fd98c60f9bf464ea2a901fd5d0b0fbb6c433f968eedbc149c48116add5b625ba5c5785b38532ea98b0c1655a

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQog6qmmFVcqq0G27ZT:VK7DDeKlog6qmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1fbd2f68f3d6ab495df6869b5b68f692cd304ed3a67f4e582789c47323afb8fd
    .elf linux x86