General

  • Target

    f06e134811f8a6d10471cbb7e27ab550b5d5ed08671cdc5effd60853beef8f5a

  • Size

    102KB

  • MD5

    91c090c6fbf6daa18d41b0f50047a829

  • SHA1

    ee334bd03719763df294f55633bc1b549f245e53

  • SHA256

    f06e134811f8a6d10471cbb7e27ab550b5d5ed08671cdc5effd60853beef8f5a

  • SHA512

    2cc1add90689daf5f524742b496d86d0f454fac9fb9de8ec70ea8923e80bb9d4aeae2c6d808fb06c636b3c0f8769633594967c31580860082f41b548ca9a0e90

  • SSDEEP

    1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV97qQS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgaVlswmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f06e134811f8a6d10471cbb7e27ab550b5d5ed08671cdc5effd60853beef8f5a
    .elf linux x86