General

  • Target

    f93c8610dbf4d4db95f3fa388d7ec1d410ed2557647eb539ae8c3bfbb648d47e

  • Size

    109KB

  • MD5

    023aa2bafa9558cc9ee4f540c6c96f06

  • SHA1

    4329786267b6b48466fb675e4e7325924754cebb

  • SHA256

    f93c8610dbf4d4db95f3fa388d7ec1d410ed2557647eb539ae8c3bfbb648d47e

  • SHA512

    595940e8d4c3985120322f68edf4a5ffe7aa96c110f065916663b68e27867601dd609f6d35181b1f3ae6f35866c6e65b0468571c61ba2f2a05c315324a8c37ce

  • SSDEEP

    3072:2D/eX4Q9DCj1E59/tBv8MbzpK9OdhzntELuOBmST0nYXbg1DE:ia9DCj1e9VB0u6OdH4uOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f93c8610dbf4d4db95f3fa388d7ec1d410ed2557647eb539ae8c3bfbb648d47e
    .elf linux x86