General

  • Target

    8c3a9f11f506867c7e50377d79d12a560edf35bd6aca68403f2c014ce41fc91f

  • Size

    127KB

  • MD5

    cf17050a4b67e22f4a5fcf9c5da7a00e

  • SHA1

    27ad54b81729db1de440cb33cc09c8ad7b4928d7

  • SHA256

    8c3a9f11f506867c7e50377d79d12a560edf35bd6aca68403f2c014ce41fc91f

  • SHA512

    04af032c2bcbaa739fcee5791d017e162af250b49f4f7bf79418f2be535c62d8fa225e100cb926dc998769795a9b7203fcd9611ff24a132ea077483729cae578

  • SSDEEP

    3072:OeEPOU0TpOPsfIFZcEe2A2GpmCNetJ8add9QzTsvanYn5h9t9Yr6gdzrV:OohIPUkPeD/maetJ8addQcanYn5h9t9e

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8c3a9f11f506867c7e50377d79d12a560edf35bd6aca68403f2c014ce41fc91f
    .elf linux x86