General

  • Target

    1a41e23422383bb78779ff41076a42f1c17ffeaf98e8b06b993dcbf258e34153

  • Size

    74KB

  • MD5

    1c472dd7c20d92f009699004379608c6

  • SHA1

    7aa3248cfdbba5a832efa4480f6174cdc4ec55fd

  • SHA256

    1a41e23422383bb78779ff41076a42f1c17ffeaf98e8b06b993dcbf258e34153

  • SHA512

    3f80f18d9393629d12d7144e9a13d79065c31299d108070e73ace73ee43366d4faf106d8e834248265374704cd43ff5c25ed42a95c8eb041d27d60b1d067f945

  • SSDEEP

    1536:F/qiTe//WXKG01KNw7XsCtGV+7/0klmLI2VOCjXUfJRk:AiTe26ZKNw7sCQSpmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1a41e23422383bb78779ff41076a42f1c17ffeaf98e8b06b993dcbf258e34153
    .elf linux x86