General

  • Target

    14c88ce4bef4ef7248d75c9c02872b5b6a1a74af655bf33a135c057998bb7305

  • Size

    98KB

  • MD5

    3d05d0dc6a2f8407de920d58305a3a1a

  • SHA1

    432f02d72b52d3c59cda01ccbb81e897e019d5fe

  • SHA256

    14c88ce4bef4ef7248d75c9c02872b5b6a1a74af655bf33a135c057998bb7305

  • SHA512

    19dec94590ba5a19e4c5f981563aa6051d48bff811b343a31296951c4437cfa45d732dff66a290633b30a423a62f1a0e14436e4f75245daecf12fc9d697a263a

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqJgF1QmqoVcqq6GnQOT:heZyo5KqJgPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 14c88ce4bef4ef7248d75c9c02872b5b6a1a74af655bf33a135c057998bb7305
    .elf linux x86