General

  • Target

    1467003a52246e3af38387948d0f1cc0e335947b9f9ecd8aed68ea7691020b94

  • Size

    101KB

  • MD5

    21c56bb0322a153738023151f338d4bf

  • SHA1

    c862699fbb5ca92f6ba9073dd6409bf9ae69fb3b

  • SHA256

    1467003a52246e3af38387948d0f1cc0e335947b9f9ecd8aed68ea7691020b94

  • SHA512

    999938db1ab455a903f845a3bf81c412ccbf09b9390dd251c691c00a707cca873f6d1c39868ffd6239d5f0aae02e5b2fc9e51f1a1da15c5ebe56697bb9af1d80

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4frHmmFVcqq0GnDZT:wJFv4Lm6AJ+4frHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1467003a52246e3af38387948d0f1cc0e335947b9f9ecd8aed68ea7691020b94
    .elf linux x86