General

  • Target

    adcf2f6e9bf3430b9506c595ab02927b9f2af0fe9a641ab7356ecbc75f8c3f10

  • Size

    90KB

  • MD5

    918a1de62a354e8e51510983abc22642

  • SHA1

    189723d5c55d79bb198cf3d2115fa28efa27a3a4

  • SHA256

    adcf2f6e9bf3430b9506c595ab02927b9f2af0fe9a641ab7356ecbc75f8c3f10

  • SHA512

    e1bc5cebf14d03090a203fc9ee450869767bda2269f8b4fb2cd43e80946aaed9d6bc6828244a68f2d4790e86a92b7f4fa0b32c015ef5c0002e8987902ab45324

  • SSDEEP

    1536:Sd2LkxTdBo3UyN0gwWiMtKAmIVtud5FlUtFdyXjIA0siDW6nm5+:aRdBo3TFVtKAmIVtuBGjdyXMA0siS6np

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • adcf2f6e9bf3430b9506c595ab02927b9f2af0fe9a641ab7356ecbc75f8c3f10
    .elf linux x86