General

  • Target

    86dff4ac48c0bd89f961c379ed83d4bd74660d85b030885f77afbce0f964b407

  • Size

    93KB

  • MD5

    1ebdb18abd6fd3d26853d3e9531e2c20

  • SHA1

    bc727519f3292d0970f5471bd551d96823f0d9dd

  • SHA256

    86dff4ac48c0bd89f961c379ed83d4bd74660d85b030885f77afbce0f964b407

  • SHA512

    50a263c8d45f63fe78f17342e8014c77f89ec60ba8509d90e5df3b6eb8bd1e612f5389bea957f255d8202d382a1ff4f6deb5c417e7bd06c85ea9bb82803acaf1

  • SSDEEP

    1536:B3ldKPttPmuVjIWLJ9OVCYWsmxT8y3nS4/cBirOOqObzg1omh53V8IJUzo15I+:lKPttPmuVjIWLPzJxwy3nS4/4OqObRmR

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 86dff4ac48c0bd89f961c379ed83d4bd74660d85b030885f77afbce0f964b407
    .elf linux x86