General

  • Target

    d51842bf8d89f0a90bd5967ab55a172499b37e11d651ee59fdce4802e8cfb718

  • Size

    111KB

  • MD5

    23243b70487399d30ab04071d8a4e511

  • SHA1

    045060502b1407547326e86c9bd28d094e89fdb2

  • SHA256

    d51842bf8d89f0a90bd5967ab55a172499b37e11d651ee59fdce4802e8cfb718

  • SHA512

    0d9d6aef9d15c228ce85b1966d7ad20f9d32273ac03d6479cdb43c3fddcc6dc293ff8def79e6189dd6647de40c43514663e8a03e980a48893031b692b04d1712

  • SSDEEP

    3072:Qk2jYylW7An93gGWzw9Vyxnr6jlmqKkcLJSYnLj9:Qpv0GvRyxnr6JmqKkcLJSYnLj9

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d51842bf8d89f0a90bd5967ab55a172499b37e11d651ee59fdce4802e8cfb718
    .elf linux x86