General

  • Target

    eba0b78ea77d1987bc63f23e333a21a39ab2b4197027cd8caf79eb640b5037e3

  • Size

    113KB

  • MD5

    2f02d117ebeb6b4650356d00027b253c

  • SHA1

    ae0bf1ae62723adabcfa52d7fc6553faa25c7205

  • SHA256

    eba0b78ea77d1987bc63f23e333a21a39ab2b4197027cd8caf79eb640b5037e3

  • SHA512

    0516f04868abc2e6aa3b0cebb8a41ffd56bb79b249bf173530e6e1351fec8caff0331e16192e944bb7c8729b8bd8683bc418659eab25af219dd5d87c77d05ae1

  • SSDEEP

    3072:+lXYUNq39taPtMFxW6IetJ8au49QuTsY6sDlaXo8txAtc4kG7gyqc:hXNM+XWnetJ8au4lr6UytxAtc4n7gyqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • eba0b78ea77d1987bc63f23e333a21a39ab2b4197027cd8caf79eb640b5037e3
    .elf linux x86