General

  • Target

    f1361eda1eeb61912378fc74e08fc5059d3f87fc87a4e66e07fb8a3b7611c6df

  • Size

    93KB

  • MD5

    cd9a14b4f6a448eb09756e625261cc59

  • SHA1

    3909ed1ba7f09a1e4094289dde64b6c6cc63b171

  • SHA256

    f1361eda1eeb61912378fc74e08fc5059d3f87fc87a4e66e07fb8a3b7611c6df

  • SHA512

    1a5433c0f40d00ccb70e7314a48d5a3c45e89bbcca6058a7eed28e390cbae80c800e09df6a254fdc533078f3c86ef9644175b279c5025b1a2dec917ec47c4eea

  • SSDEEP

    1536:un/HVRF8/E1ULohHPw3at21786GefnQ340z3fm2qmJFp+7ZmmiIVcqqzIGnOZT:un/HV8iUMhHP2146ffnQ3bU1lmmFVcqJ

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f1361eda1eeb61912378fc74e08fc5059d3f87fc87a4e66e07fb8a3b7611c6df
    .elf linux x86