General

  • Target

    693fef334d2c20f37ac5dec182648a7c30da1079da3a8e78a1b70367e3a9c877

  • Size

    111KB

  • MD5

    c5039b37f281d3e2e1181ae80179d6ce

  • SHA1

    c37454e17da05fd9a52a57ff016dc4567930c79d

  • SHA256

    693fef334d2c20f37ac5dec182648a7c30da1079da3a8e78a1b70367e3a9c877

  • SHA512

    13f2ff93a1fa8869d2084eebe8374ab003dab3dfb4f480ede0ee4849b4a6c61962d67c2ffecd633de199ee53873a2fc5831137a0e3754a3dfb13db6be5c5a31d

  • SSDEEP

    3072:mGpzF/IyUDWAe7OvN9+Eg6/VCBabcps7F2mqo5cqdtKnbjT:mGpZTKv+BabcpWF2mqo5cqdtKnbjT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 693fef334d2c20f37ac5dec182648a7c30da1079da3a8e78a1b70367e3a9c877
    .elf linux x86