General

  • Target

    abe9308abaaf3b3e5b90d9f680ba58d4e9259015e08aae381930815cdb852eca

  • Size

    116KB

  • MD5

    f9c5d92e853b6fbe7ae26553f71f5f33

  • SHA1

    c82ee2c0383883e1c64b4e1f34197d609c8a0213

  • SHA256

    abe9308abaaf3b3e5b90d9f680ba58d4e9259015e08aae381930815cdb852eca

  • SHA512

    3d29d59c6cf992495df9b1a4f2f3fe113faf4d9bba2240b2d3f3a4a9bfab0daf2404288076bc699c7b259eb22d44ac01827f9e57c6bffc9276ddb9d71568ae85

  • SSDEEP

    3072:4hnxOuRTxozKIoWj/2etJ8au49QuTs8G2og5+rFgxAtc4kG7gyqc:4DYKFWj+etJ8au4l9G7gxAtc4n7gyqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • abe9308abaaf3b3e5b90d9f680ba58d4e9259015e08aae381930815cdb852eca
    .elf linux x86