General

  • Target

    a973e379eb48c707c6aa0e7477590fd627aed19faad184cf5ae46635ae8bf91d

  • Size

    153KB

  • MD5

    c15ebdd2d1177dea6865965120de9070

  • SHA1

    721286f227303a6a6e51e4f870edd687c2789ebf

  • SHA256

    a973e379eb48c707c6aa0e7477590fd627aed19faad184cf5ae46635ae8bf91d

  • SHA512

    bb72f0d3b8feed7b41ad5cded9af90e7f2082845e63c5709fa3514c792ca1e794f13ddcfb78f023c46709d4b4ed337db9103e00cbc89a7da886a100d52741822

  • SSDEEP

    3072:dP+JoERejZrQX1qNpd+Me7wCUhaOlV51KHbxhY/XH90PfNatph1:deoERKNe0CUhJlVKHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • a973e379eb48c707c6aa0e7477590fd627aed19faad184cf5ae46635ae8bf91d
    .elf linux x86