General

  • Target

    0cbc531e7b6486db4d79161579ba3e019866b722cbf9f45689a56748c91f5a6e

  • Size

    83KB

  • MD5

    d9dad5ce1c4ce134e6f6f53fa2465685

  • SHA1

    8ac1ddb1d08c5a474f13545931ad2f8c61b62ae1

  • SHA256

    0cbc531e7b6486db4d79161579ba3e019866b722cbf9f45689a56748c91f5a6e

  • SHA512

    982c77ca8b1031c282160a18c46369eb0c278e828443de77d54a22afc6b28fdcee1ad26e839ef136c5e990212fd1762af22119a4f758baf5695e4ba6c27e3cfa

  • SSDEEP

    1536:tSQP74RoUSUM9HqjjAX4w5jvl7MHdJfuu6YK0mK5hEddddd1bdQl5+mYHc0r6jmy:tSQTYoUSUM9HqjjAXdjvZM9duTW5hUb2

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0cbc531e7b6486db4d79161579ba3e019866b722cbf9f45689a56748c91f5a6e
    .elf linux x86