General

  • Target

    113b4afe516f64a1ed6bd4dbe1d9285bf4f740933da857fde9f4b328acb1f874

  • Size

    97KB

  • MD5

    d02777c7b986d0bd06c1f343b71ceb42

  • SHA1

    20075df518726767c57a92c0952ad8c0ef7ca20b

  • SHA256

    113b4afe516f64a1ed6bd4dbe1d9285bf4f740933da857fde9f4b328acb1f874

  • SHA512

    e35df73fb9c1690dd33b34105ad98f7632fe5cfcbc1c77245e9aa749bba01a1860df89030c8ea27a94d560ccf484299f688687ce9a0f7a9608edcdeb269e39a6

  • SSDEEP

    3072:gjtwgA6UlYzZveohR9kIEgfdGZmmFVcqq0G27ZT:gjhzt3mIEgfAmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 113b4afe516f64a1ed6bd4dbe1d9285bf4f740933da857fde9f4b328acb1f874
    .elf linux x86