General

  • Target

    9cd5ab5ea55942a4a77d3b918baf3f1a46284e98d9ca3049174fef95ce73da03

  • Size

    101KB

  • MD5

    704736c4c5b53c497d64a1f4931e1ddb

  • SHA1

    26a0050dc4d8eabeeba7281ca2cb71a8aa521182

  • SHA256

    9cd5ab5ea55942a4a77d3b918baf3f1a46284e98d9ca3049174fef95ce73da03

  • SHA512

    ee5202d1fb1525543ddb1df80aa881c0d3e57460d085ddfbf17a5133c07eeccc1fc56b1c468a50116ff1663cb7c28c20a21263275886fc836335f95117998493

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fbFmmFVcqq0G27ZT:wJFv4Lm6AJ+4fbFmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9cd5ab5ea55942a4a77d3b918baf3f1a46284e98d9ca3049174fef95ce73da03
    .elf linux x86