General

  • Target

    6c90dec27f4b60f86e44175c00d77170502767bb9eeb958442a70ddda2932fc7

  • Size

    72KB

  • MD5

    85928dd9dbff17bfc02ecab83f7a4f73

  • SHA1

    4a4b081360a139257724dceef0f66e2f2428fd9e

  • SHA256

    6c90dec27f4b60f86e44175c00d77170502767bb9eeb958442a70ddda2932fc7

  • SHA512

    33e9dca2b7ec022b62740b4d559684ac9674ff07e29bbeaea9c30d236daeb9b14d605f131afaaa815ff1264c14c457a72aae75242d9d9aa9b319087e50d6254c

  • SSDEEP

    1536:0+xNVpGQWuKv8xKBnq5PeOj5zMLYS5qmLI2VOCjXUfJRk:nNT830xKBnq9eGfS5qmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 6c90dec27f4b60f86e44175c00d77170502767bb9eeb958442a70ddda2932fc7
    .elf linux x86