General

  • Target

    d5f4ad9dab6d55ebf23ed78705072789a19f9a152cbe1f749676208d2a96a2b4

  • Size

    101KB

  • MD5

    fc1e887cd82107a0aa94c2791e016fe4

  • SHA1

    328d663e1e6375e753a48f8296461a02fd6bb820

  • SHA256

    d5f4ad9dab6d55ebf23ed78705072789a19f9a152cbe1f749676208d2a96a2b4

  • SHA512

    320501250bb296980b07ba21f5d3eca3f53ce33f92165c9893a6646382daa998755fd2038ef143c947fc9ef0ee17d02f6180ef5b8dde58e4d7ddd572b9573bd4

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fMHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fMHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d5f4ad9dab6d55ebf23ed78705072789a19f9a152cbe1f749676208d2a96a2b4
    .elf linux x86