General

  • Target

    197417e0072fcde4c78ab629c1148b59bffc89227a23556fa5646c353690cb64

  • Size

    97KB

  • MD5

    1e13a7daf8464f927ece2a4a60392e7d

  • SHA1

    8eb60acafd286dff7adeb1bfa9ccd4f6e7f81caa

  • SHA256

    197417e0072fcde4c78ab629c1148b59bffc89227a23556fa5646c353690cb64

  • SHA512

    b586e316bf34a0ba069639f73fb998ce4d1ecbbde96579b707f53b903bfb1b04bc03b5f1db8d75a53e5bd6582c350f85eaf4625107387a966f6a9c1439fc8a70

  • SSDEEP

    3072:gjtwgA6UlYzZveohR9kIE5fdGZmmFVcqq0G27ZT:gjhzt3mIE5fAmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 197417e0072fcde4c78ab629c1148b59bffc89227a23556fa5646c353690cb64
    .elf linux x86