General

  • Target

    d869f33c00251fe691a1a2f3f0e3a0c27cf97e61ee8365f46473e900b9a10db9

  • Size

    97KB

  • MD5

    ee5ae08c9f55c9b43fb98437c3decf8b

  • SHA1

    e2df50b8b75d9a5411feabe12c088a672dab2823

  • SHA256

    d869f33c00251fe691a1a2f3f0e3a0c27cf97e61ee8365f46473e900b9a10db9

  • SHA512

    282692977393c5c0415965254ed4fe3b29fe0a4d916581c51696531be058364f5d65b71bbdca9b7677d996d0fe98beccbca81a5d3e8c61cbdbfeeff6df835ddc

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogoEmmFVcqq0GnDZT:VK7DDeKlogoEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d869f33c00251fe691a1a2f3f0e3a0c27cf97e61ee8365f46473e900b9a10db9
    .elf linux x86