General

  • Target

    d8c5c9b9d8781f3aecd7f8d520d77f937ed68c3528b3768730c45f49ddb2ba44

  • Size

    124KB

  • MD5

    d55b425c0dc02f0e94c7eec9711783a3

  • SHA1

    6ff309eed16ce2b17e1cb0cf06e4f5b6df5e4ce7

  • SHA256

    d8c5c9b9d8781f3aecd7f8d520d77f937ed68c3528b3768730c45f49ddb2ba44

  • SHA512

    75fe82fa298924a94d0c7e99553f15da7d81bde389bdada1f24a3b5957b46380ee39026188ee5097dcbaf0ba572c9746170caaf8e087f218151f93b2e0648637

  • SSDEEP

    3072:EXY5gzI24XRFnDjmoRcQeFxfusim3ZMfhzD9oY4giAGaJpP:EXY5BDXR9Jc5Om3ZMZzD9oY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d8c5c9b9d8781f3aecd7f8d520d77f937ed68c3528b3768730c45f49ddb2ba44
    .elf linux x86