General

  • Target

    0b94a452ce463f110f6ee53a8b189ac51bb22380209336ff220365567496f8ca

  • Size

    101KB

  • MD5

    32e55548402604298cfd4d30204ff9b9

  • SHA1

    2e4bc29c15ebaed297afc521b277a0466e7997e3

  • SHA256

    0b94a452ce463f110f6ee53a8b189ac51bb22380209336ff220365567496f8ca

  • SHA512

    c0157ba053b2750b82642434b3b53d7aa8db020ba4155e10c2707f271e2986bcca65b8c2d2b0a1e6aa593c765c5533d047770e5c6807aa7da677c3fd4c7a32ca

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fuHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fuHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0b94a452ce463f110f6ee53a8b189ac51bb22380209336ff220365567496f8ca
    .elf linux x86