General

  • Target

    d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc

  • Size

    98KB

  • MD5

    a07682fd7679c384ff45f3d4c57f5d09

  • SHA1

    67babc8ce816a93711ac1ab0babebb547984b6ee

  • SHA256

    d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc

  • SHA512

    733dffc1b9d83720b18f0143a915e41f37b0ce927135bea161b4bc8dbef6ebcbda1e5210274c684e875496b673db3eb2b27588e003dc5cf7432feb53c9e20513

  • SSDEEP

    3072:SHmtkqC/0anNLXHwleeL+I5GvEXmfKgo6uQGKs:SG3BCdeL+I5GvEXmfKgo6uQGKs

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc
    .elf linux x86