General

  • Target

    d6b7ca0f63eec97d581c3f9bc0e3a9a57821d138bb1e4bd1b1e92171e6d3812a

  • Size

    97KB

  • MD5

    2603e008cd0bf110bb706b4e9ca37a94

  • SHA1

    cc4933eba731006aaf3af110ab1ceb5dad758de6

  • SHA256

    d6b7ca0f63eec97d581c3f9bc0e3a9a57821d138bb1e4bd1b1e92171e6d3812a

  • SHA512

    49eed44a92746c55ab8a52657f64212e04336fffe40e05aa9248dab2fbf2ed842904087954a610e0b2a76c0db4fca7bafa27328c9adc3be073d89278c3f59fc8

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogeEmmFVcqq0GnDZT:VK7DDeKlogeEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d6b7ca0f63eec97d581c3f9bc0e3a9a57821d138bb1e4bd1b1e92171e6d3812a
    .elf linux x86