General

  • Target

    65fa5df8e34555ba328270c66dc2bc6c1e7df52cf9aa98d4859ae0fcdb03d752

  • Size

    92KB

  • MD5

    1c0b275750d0bd10aa650d28cfdcc2e8

  • SHA1

    7942170db6eb0235fcee444740f5d3ce0a9bb90f

  • SHA256

    65fa5df8e34555ba328270c66dc2bc6c1e7df52cf9aa98d4859ae0fcdb03d752

  • SHA512

    a0af990b2cb3314c2a3fa94bff7d24f2fc3a35083b8662b74e40ee52cf311ac3198f237217328f8eaa3ed24a019f1208b082ce43d34afd7ae4296d9e269d37eb

  • SSDEEP

    1536:0yXDP3RhUNUPXPKmYQYCifde5c8/z4dzJWctU5mZ5hir/YWg2PM37K8PN2UrYe:vXjzUNUPX5YQqfdIc87MzJlZ5hir/YWE

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 65fa5df8e34555ba328270c66dc2bc6c1e7df52cf9aa98d4859ae0fcdb03d752
    .elf linux x86