General

  • Target

    29ae29dc598f96dcf31b9c9b53d94d6c180e2d2460573dc2e04f6620ae087bd0

  • Size

    88KB

  • MD5

    17ad5a7f93127fa3fe9a211a6bfab8ce

  • SHA1

    1b7b6fc84c0938ef415d7cb16ce4bc4cdb10464b

  • SHA256

    29ae29dc598f96dcf31b9c9b53d94d6c180e2d2460573dc2e04f6620ae087bd0

  • SHA512

    c5503624b9bfc6a369ba1ce028b6d045028699903989e217a7f076df220b29d79a0944c74ad2e2eb407e6a91c7f67c72ea81b200d00f9fb2c13ad109a68c8e2c

  • SSDEEP

    1536:7w7/whUVUbYhAzfw1AT2zgA9wak60m14ORPmCjrJmKHo0rIjNVfzksd:U74UVUbYCzfwOTKR9tdvFmeo0rIhVfz3

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 29ae29dc598f96dcf31b9c9b53d94d6c180e2d2460573dc2e04f6620ae087bd0
    .elf linux x86