General

  • Target

    f8cff7cfdb90566f64013e9c1a41c8cc8f9da4d97f0a65967519d777f2d07f91

  • Size

    122KB

  • MD5

    125cd2cb53d89bb382817b8037644f87

  • SHA1

    17a38d5a9da00c6ca0d5441ea63ec9ad95ed9f12

  • SHA256

    f8cff7cfdb90566f64013e9c1a41c8cc8f9da4d97f0a65967519d777f2d07f91

  • SHA512

    ee3696fb13271975587ecdf2eae845359d01c8d54594105d4722f0c077263cdf87ec91a2d3b70af746b66e85df43c5ea339f3d4d5071aa05b9d47ab9ec2649ae

  • SSDEEP

    3072:lEjQpirsWaYsQp6+ikbetJ8add9QzTsNuKPzx22Jg4NKcXeGcgqGK:lEMQo+ikbetJ8addQouKr82Jg4NKcXdK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f8cff7cfdb90566f64013e9c1a41c8cc8f9da4d97f0a65967519d777f2d07f91
    .elf linux x86