General

  • Target

    795cbf03f977f601b25fd08dc5a7e7c2a719f598b863403b9fa5f4930dfdcdeb

  • Size

    113KB

  • MD5

    edb77a0cfa62640ac7e016b7e58f1a2c

  • SHA1

    745c579d13c3b6bb40bcf0000fdfbcdcc27202b7

  • SHA256

    795cbf03f977f601b25fd08dc5a7e7c2a719f598b863403b9fa5f4930dfdcdeb

  • SHA512

    8283aed65ee52c7579dcb4aac55c2cbb261dddfc82bbe834dedd8b6d7ecb0ef798e8abc2563680b0f967fb8ed88047d9dff99af2954c8231e052a255b53beaa8

  • SSDEEP

    3072:+lXYUNq39taPtMFxW6IetJ8au49QuTss6sDlaXoctxAtc4kG7gyqc:hXNM+XWnetJ8au4l/6UStxAtc4n7gyqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 795cbf03f977f601b25fd08dc5a7e7c2a719f598b863403b9fa5f4930dfdcdeb
    .elf linux x86