General

  • Target

    df826ee67e8a2a2c46bffab275c84285a2dd06eb120d0e335bef23aeee509cdd

  • Size

    89KB

  • MD5

    a42acf811597772e52fb7366724696cc

  • SHA1

    74e4dbe76cef7b4f2c86fe217226fdf1f4ca6fe9

  • SHA256

    df826ee67e8a2a2c46bffab275c84285a2dd06eb120d0e335bef23aeee509cdd

  • SHA512

    1a7b6a0ed4e8cbd6a0a3b846d922d03eeb8a43270a6201e197aefdac6cf77c784becc728d29b31a94d3343440c7b15f761a1899094231a0c527acb2c3fb96ba9

  • SSDEEP

    1536:2HgmM3PJOR/k679fwqWQC1yIZ2DN1d3Oon5hhUVrJs6Wshe0QzUzJYQ2Wk:gMcR/kI9U91yIZ2DN1QY5hhmWUe0QzUy

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • df826ee67e8a2a2c46bffab275c84285a2dd06eb120d0e335bef23aeee509cdd
    .elf linux x86