General

  • Target

    0e067b219c81ccc9f4fd92a20d1a0a904c5e7ade1e15600a206abfcc671b0105

  • Size

    101KB

  • MD5

    b46f2416a5b0d9f35232cfd48f274e1f

  • SHA1

    047d97f54df03ff649de1d5cf17fcd0f5f637e5e

  • SHA256

    0e067b219c81ccc9f4fd92a20d1a0a904c5e7ade1e15600a206abfcc671b0105

  • SHA512

    ef069d2d7783b51a3367ed0b304b9e42dd088a925890e6bd4598b5a5aef7cca37b01b6755d3d3e6dac2da477e4bb8d5e0c45e5fbd7d034679234ecd38e1f1b72

  • SSDEEP

    3072:SOGAEtZoGZKWl6u4YTnbHEbimmFVcqq0G27ZT:SqEtZ755nbHEbimmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0e067b219c81ccc9f4fd92a20d1a0a904c5e7ade1e15600a206abfcc671b0105
    .elf linux x86