General

  • Target

    61168047e88f35952f05603d80f2378e5724f7871a68591e79d7c7743f3abc3a

  • Size

    101KB

  • MD5

    9744225a250f77858927fb33007f7a4d

  • SHA1

    38e373a34e1713f63e147a900cb1cb3e036c2385

  • SHA256

    61168047e88f35952f05603d80f2378e5724f7871a68591e79d7c7743f3abc3a

  • SHA512

    20257d3a4cc06c18012199be91a4484f5c953ac03bc71f12158f42ce7f08fd33f406a33000679c205e90f65ddf6084113b610759c1585b0d259f8f4a93e35f1a

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fCHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fCHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 61168047e88f35952f05603d80f2378e5724f7871a68591e79d7c7743f3abc3a
    .elf linux x86