General

  • Target

    0cd3cf0bbe63664c45949b49d7a9343f6b80d85d3c158844b12183eb13f57d15

  • Size

    92KB

  • MD5

    fc6e7f8c50b4e8d615b35c0cfeda89ab

  • SHA1

    8ec0f91b0a437059528f852c2602875217d3556e

  • SHA256

    0cd3cf0bbe63664c45949b49d7a9343f6b80d85d3c158844b12183eb13f57d15

  • SHA512

    a441799818ce0316b4479b60f4a40011b90ac2d4f5afab8ae0af3f381a321dc7b57eb1154b1f388300ae305ee57a9e44af43de3013b4440bdacc087a7cf1615c

  • SSDEEP

    1536:495npQAJSM3S9VWGexKIeDAGan+OjGVcuO9QyDmKHo0rIjNVfzksd:0npQYSM3mAvxKNDAX+OiuvDmeo0rIhVj

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0cd3cf0bbe63664c45949b49d7a9343f6b80d85d3c158844b12183eb13f57d15
    .elf linux x86