General

  • Target

    0df9ae3fa9f92fd59b7d97a997044da3f59da34e046fcb23a62cbbf3185ca244

  • Size

    101KB

  • MD5

    fac872e84f7741c10a3cc05904f6ca43

  • SHA1

    ed32dd50589c52d407fc0c5b17662141d90b4222

  • SHA256

    0df9ae3fa9f92fd59b7d97a997044da3f59da34e046fcb23a62cbbf3185ca244

  • SHA512

    0c7816c12d720f1ad08d7d4567fcef96085f2e2a892a02af28a62220079d23eb334c2789dba0cbb05c8c3f439c149ca2d75375da815f0958f95e2cd3b3262915

  • SSDEEP

    3072:SOGAEtZoGZKWl6u4YTnbHubimmFVcqq0G27ZT:SqEtZ755nbHubimmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0df9ae3fa9f92fd59b7d97a997044da3f59da34e046fcb23a62cbbf3185ca244
    .elf linux x86