General

  • Target

    fad4184ee2ad3f70199e7d5142fa7e3fffb0d4f874abf91a5c6b81e80378690a

  • Size

    74KB

  • MD5

    715dd5f91e686d2d90627e3c403ae6c9

  • SHA1

    b42d89b4bd51cf1fec9604db31fed8f0d9f04f1b

  • SHA256

    fad4184ee2ad3f70199e7d5142fa7e3fffb0d4f874abf91a5c6b81e80378690a

  • SHA512

    15d29cc6dfaf9ab9ff585d2d8916c10a956285e78d295238b335a6feb689841497f86aebcade016082528a23c887ab8acbd3346c59aec535405b0292bd6ea4aa

  • SSDEEP

    1536:mC+yTmLeMW++kmOIwZrLi7lxZqf4B9eM6YKQmLI2VOCjXUfJRk:dT4QL3OIwZXijZcEjiQmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • fad4184ee2ad3f70199e7d5142fa7e3fffb0d4f874abf91a5c6b81e80378690a
    .elf linux x86