General

  • Target

    b010e5510350b25087e5e3b7b962645b

  • Size

    74KB

  • MD5

    b010e5510350b25087e5e3b7b962645b

  • SHA1

    5529fc7dccc433b3dcc4071eb229f933935ed2a0

  • SHA256

    70d04b22b938834a6d0cd68e902b44ec0435ecaeae8bfeb1f35034c114f9581c

  • SHA512

    ac79acb1570a0beeb931a75f3262155c583c7a38157076d38b89caacd4350d38538d08bed36299d0bd4a209fa9d0ae3c70966c1f167c75383085bf9d2c524917

  • SSDEEP

    1536:vnT6kXfEC5WZscuuofK79FO1RZKSzBlBcmLI2VOCjXUfJRk:GkXfERmPuofKZFqZpf+mU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b010e5510350b25087e5e3b7b962645b
    .elf linux x86