General

  • Target

    621e68683ed1bcf478ef4c25305402413b3f6f23eaff09922754e5899012ff8b

  • Size

    87KB

  • MD5

    94ea5bfce2db908801c5fffa84161823

  • SHA1

    6abd2eb7c5f1a3e1e05753da2eb5512c4b4787e1

  • SHA256

    621e68683ed1bcf478ef4c25305402413b3f6f23eaff09922754e5899012ff8b

  • SHA512

    3dfc744b357af86f574a784b9c37807df239c0da63811884594938ed488a4ae1c5f469ee7ae4d31791173db49c80a99b4aa7194835d767aec62eb9d20ebd0f41

  • SSDEEP

    1536:D6CisUwe9wAjhaue14dFrWBDJlYwaPyvk6+nAiGuSEKzqEGjxmLII+X08NCnNh6:+CisUwe9wAjh614/WBbYVPyvddRuSiEK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 621e68683ed1bcf478ef4c25305402413b3f6f23eaff09922754e5899012ff8b
    .elf linux x86