General

  • Target

    c7ffe255a6a6e833752f999de6bf8f15114e20ac48f7745c0c859b795e9789c6

  • Size

    109KB

  • MD5

    e0ae478bdb4015b61b826bdc8ddf5770

  • SHA1

    9abe9d67937ef0776ab5eb6600089a0dba63b4e4

  • SHA256

    c7ffe255a6a6e833752f999de6bf8f15114e20ac48f7745c0c859b795e9789c6

  • SHA512

    9ff8d368f0fa12d0d64d191b39bbc3a64a95a4c1d39a6e7b0dca678e6220e16ba2c0978a141a49399bc6c95c8d6f6f2bb857d09190701462833ba03413a8f08c

  • SSDEEP

    3072:2A/RX4Q9DCj1E59/tBv8MbzpK9OdWFnt3LuOBmST0nYXbg1DE:hn9DCj1e9VB0u6Od2buOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c7ffe255a6a6e833752f999de6bf8f15114e20ac48f7745c0c859b795e9789c6
    .elf linux x86