General

  • Target

    b2a7f345bb52c5432f6e2aacc365a5a4d19996215333b986f17e1c24b2c7bf87

  • Size

    85KB

  • MD5

    bf71ebb6cd82522a5ea5892cbbd63878

  • SHA1

    a43060e2884db627b8e8a4cef76511975c5f46c7

  • SHA256

    b2a7f345bb52c5432f6e2aacc365a5a4d19996215333b986f17e1c24b2c7bf87

  • SHA512

    fa23f74c4661e4480f4bbe80fee7d0ba5305c24b39826cc5a9867918a68d1d93029af61552f04c088db805f58135c27eb7817a83fe57cd689a615715019da8e6

  • SSDEEP

    1536:0uh1IULrjOWswudVchqXV0uHMfuFywBLgMGN1gnPwJUkit1O5u1m:0uLPudV4qlbsnw5gMc1gn4JUkiXO5u1m

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • b2a7f345bb52c5432f6e2aacc365a5a4d19996215333b986f17e1c24b2c7bf87
    .elf linux x86