General

  • Target

    d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3

  • Size

    113KB

  • MD5

    9dcdd7c677cb288210f1590b4b9b011d

  • SHA1

    bbeb6098fdf402e4e06b2005ef3533a5492b3c0c

  • SHA256

    d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3

  • SHA512

    9b833ab3f26fcdbe6f401df1219770c286231dd7465b2dcb359d389229150c0c4e4b7109b36f3095dfff0874dc2ef1135f81d4f92a5707e840a237edf41f00fc

  • SSDEEP

    3072:Udu82mUdg3UfP6JiBAt6FcetJ8au49QuTs19txAtc4kG7gyqc:g9+zit66etJ8au4lS9txAtc4n7gyqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3
    .elf linux x86