General

  • Target

    7d12db45df5dd0f3f77191e98a23444979ceeafa0813084b2ba9eb78e93b5875

  • Size

    122KB

  • MD5

    ed01cad3f45257d26f4c433df53ffd37

  • SHA1

    51baffbdb60637c731cf648b85cee5bfea5d2a34

  • SHA256

    7d12db45df5dd0f3f77191e98a23444979ceeafa0813084b2ba9eb78e93b5875

  • SHA512

    21ab4223dd31c3cde523bea4821db88953890131457e8c8e19d994a1f3a1fe586588881ebab99ad17a15b346f92b6a62c4cf30524f0f022620b91899ecc28b43

  • SSDEEP

    3072:JmRcYwWSN4u4vlU3NSqetJ8add9QzTsNzn0t4NKcXeGcgqGK:JgZcEi9SqetJ8addQ+0t4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 7d12db45df5dd0f3f77191e98a23444979ceeafa0813084b2ba9eb78e93b5875
    .elf linux x86