General

  • Target

    c1711caf3878feeed04e29bc59fcd7ed550e256b08c5edfa6d40489126bf8602

  • Size

    122KB

  • MD5

    84e2e5e0698d28f59cc92d7b3e993474

  • SHA1

    0383253b1a2953cbabf13c237e6bbe2f78c3428e

  • SHA256

    c1711caf3878feeed04e29bc59fcd7ed550e256b08c5edfa6d40489126bf8602

  • SHA512

    19ec35fcdeaf44811b9d0cdb95a0c9ffdce862be2e6ca8dab2ec06474af41306c04f0ccde0840c0eb341024382634c9ea6761a69727ab4f0ca829f111c006a28

  • SSDEEP

    3072:9QxqZwVPgRu4vM9+NSoetJ8add9QzTsSzmHt4NKcXeGcgqGK:9VqIBUSSoetJ8addQfat4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c1711caf3878feeed04e29bc59fcd7ed550e256b08c5edfa6d40489126bf8602
    .elf linux x86