General

  • Target

    8dfcbecd3306958c5fe2f3dad6378d72bae50439d4bdbfcf652d3274f27b751c

  • Size

    148KB

  • MD5

    58a5557551ff8c183e929c2c0cd0ecac

  • SHA1

    20e108584229f60d2d9cdd63455710b52c98cfef

  • SHA256

    8dfcbecd3306958c5fe2f3dad6378d72bae50439d4bdbfcf652d3274f27b751c

  • SHA512

    8c87650da5cd3952047a67e6bc59164bf2478156e47f37da50063b4b64374002d9a737980cc79d0ebf6dafeca7b0f9fce789b55086ca0222e5dec759c1f00a8f

  • SSDEEP

    3072:HI13lqCeZEU/xUVVpSE8JqMAOltGEalhipRwWriH90PfNatph1:4lq0OEx9M3lJeoiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8dfcbecd3306958c5fe2f3dad6378d72bae50439d4bdbfcf652d3274f27b751c
    .elf linux x86