General

  • Target

    d0aa9ba57d8f0ca62cc2097e53dc7a0b164483a9fa74ec3d9f1e998e61fdf398

  • Size

    148KB

  • MD5

    1e84fd06fb551f65dae2a508b86985a2

  • SHA1

    8f9c4c83227a153fc0c6d5e89c495333dc30d0d0

  • SHA256

    d0aa9ba57d8f0ca62cc2097e53dc7a0b164483a9fa74ec3d9f1e998e61fdf398

  • SHA512

    c0d28191c1c31f0377af239edafb3d82205dad0869ccdb870c485126de1b316f34587fc56714e59fe6cc63c957570e282ab35b10b2dbc7990088a6ccae7bceb6

  • SSDEEP

    3072:HE9rx5elUUrxUVVpSE8JqM+OltGDalhGpRwWriH90PfNatph1:MxPaEx9MNlSekiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d0aa9ba57d8f0ca62cc2097e53dc7a0b164483a9fa74ec3d9f1e998e61fdf398
    .elf linux x86