General

  • Target

    6f2e3db78e624162bc1447e56b23e59cecd801fa8846e69f7378f32ace2864a6

  • Size

    122KB

  • MD5

    01f715b5d47024b68f64f6c903ad4d0e

  • SHA1

    7bbfea5c7ff7bb8efae38de26b3cdc5c7b89c8b8

  • SHA256

    6f2e3db78e624162bc1447e56b23e59cecd801fa8846e69f7378f32ace2864a6

  • SHA512

    850aab750f4e5c24c68d59c462ce12b8511f14bcde4c75bebbd653a325159c1a06501c4f34c8016075552ff525b709b191fd891b8c018cfd3ddcc2b793377d6c

  • SSDEEP

    3072:ltj9Do+aP0YsQpZ+73etJ8add9QzTs0z+/42Jg4NKcXeGcgqGK:lt/Qr+73etJ8addQ9j2Jg4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 6f2e3db78e624162bc1447e56b23e59cecd801fa8846e69f7378f32ace2864a6
    .elf linux x86