General

  • Target

    fabfc315c685f68c66160912b1e8b13e616e441d28e1e66669811237e02f3408

  • Size

    97KB

  • MD5

    ab6d7ffabfc919675cb3eb163f27fe29

  • SHA1

    e62f061f0dc70f5c4f308fd5def02c7436229ae8

  • SHA256

    fabfc315c685f68c66160912b1e8b13e616e441d28e1e66669811237e02f3408

  • SHA512

    f26dc1d94e52c0ee389032abdf8f7ad4791d68ded40e914ec29b82094d6d5a960048b728116bfafa86d4d581084c82bd9ea24b868adc12c38f15ce59d2996d08

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQoghEmmFVcqq0GnDZT:VK7DDeKloghEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • fabfc315c685f68c66160912b1e8b13e616e441d28e1e66669811237e02f3408
    .elf linux x86