General

  • Target

    a0fab233163c4c002e5dabac4d9f62886b62ded5971bf4b0efb39d134431519d

  • Size

    101KB

  • MD5

    7267dd75135dc126b7d0f64a589dacd5

  • SHA1

    ac55ee6ca13b34574d4b7e15a24659875a1223f2

  • SHA256

    a0fab233163c4c002e5dabac4d9f62886b62ded5971bf4b0efb39d134431519d

  • SHA512

    b982f5c5ba5a2e4747874dccc317c4bbf895d78578ae3542acfcea40222b47fa725a7a7439aeeaf12992cc2f0bdba5a3f1f294ef89308de437279a866fdd7b3c

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fmHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fmHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • a0fab233163c4c002e5dabac4d9f62886b62ded5971bf4b0efb39d134431519d
    .elf linux x86