General

  • Target

    d5c0c600581907c686d36a4f2da2ff4aa9e6c3fb193dc00301f354ae89a4d7bb

  • Size

    83KB

  • MD5

    7092f1b3c97f1a712d001b5305a9a3fe

  • SHA1

    11cc5ad25fd9cffa9ae9f8da11944db10e40099a

  • SHA256

    d5c0c600581907c686d36a4f2da2ff4aa9e6c3fb193dc00301f354ae89a4d7bb

  • SHA512

    7555325cc9962d2174096bff8ad8d8149c4c657526a01aad6e13b003d600fd4e233f5ac0ca09e7c9546656e505e3fc980cf4e8ceb9f4124cb114a030e3d3fb00

  • SSDEEP

    1536:2z5MxnOQxOWrEBrc81ybEKm4pSsyJVSnQLCImUEchOWyB4GZrk:2z5lco9c81cEK17yJwQGImDchOWI4GZI

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d5c0c600581907c686d36a4f2da2ff4aa9e6c3fb193dc00301f354ae89a4d7bb
    .elf linux x86