General

  • Target

    0b41d8a59d786bebe2ba391f544f78b49a9373d9fa2e5145026ace6fa35fb315

  • Size

    101KB

  • MD5

    b9a0a1f0ee43923da2af2197bc129b2e

  • SHA1

    f0f1afe6bbc38ff6c4a545e14d6b0e04d60525c9

  • SHA256

    0b41d8a59d786bebe2ba391f544f78b49a9373d9fa2e5145026ace6fa35fb315

  • SHA512

    2dc2ff9b6c1352875406eaf391bf55cbccd194a146e1cc69ee05d0b9a5f63b714cbfee134724aae8ec8ca77c520c5bb682fb768ca378f1c16c5fe0f0ebc73a7e

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fHHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fHHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0b41d8a59d786bebe2ba391f544f78b49a9373d9fa2e5145026ace6fa35fb315
    .elf linux x86