General

  • Target

    e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9

  • Size

    96KB

  • MD5

    0262623d7565e8a9ad5cdf31da88b966

  • SHA1

    eb020e711a0e5374a658bb7c247b2fbca101e55b

  • SHA256

    e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9

  • SHA512

    f6ddca4636b42e2961376b766c8f2903161059174a564fce9d3089872def339eb03c26eebb31e4e23dab817bd9ee27e17b024a2daffc12cd19c412750cf15f5c

  • SSDEEP

    3072:rMzGU4AKwq8cP+pO0h2hN5dyo4QCokIg8zcCLu:rMzGYW1tRhN5dp4QCokIg8zcCLu

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • e8ba821305ab0dba4b1a4efb3073b35db8d3ea7ec47a072c1966d1462f8070f9
    .elf linux x86