General

  • Target

    a76af7e2f2f92a41f500bedf3b77781e3fc187d7ab7e4c593246bdbe825cab75

  • Size

    124KB

  • MD5

    d04116e6f599767cc955a8dc439957c7

  • SHA1

    451fb8040519e4af0ddd1e8257159045ac705750

  • SHA256

    a76af7e2f2f92a41f500bedf3b77781e3fc187d7ab7e4c593246bdbe825cab75

  • SHA512

    1f2e0d584ff87d0a55b3d33ecfe34bc61ba95601d31c848c0d908f737fdfb473fef929b321bb105f2863537063e33cf830d96ab0e238d8877f61ce4de13b123c

  • SSDEEP

    3072:QbqCkOz3UoA0iCHWB+yGe6v7LhcDLoY4giAGaJpP:QbqCVpAj53Iv7FcDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • a76af7e2f2f92a41f500bedf3b77781e3fc187d7ab7e4c593246bdbe825cab75
    .elf linux x86