General

  • Target

    b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e

  • Size

    74KB

  • MD5

    a3c2290478472c99b59218ad355ed949

  • SHA1

    21668ac23fc72005a7b158da844378aaa49e5c17

  • SHA256

    b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e

  • SHA512

    3447cc2847f73fbe98dcb3374d323654094b86f2757e6aa2a61a1ac152db2880af56c92580d76ffb840507f2f05d331ff7d74940e22079cff5551e3a6a818242

  • SSDEEP

    1536:E+tin6BzISu1iW4MFsj6hhfh9GlG1QENmjspPxBXk3tPO568m:E+tIDFsehhp9Z1QEQgppBXk3ZO568m

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • b6c8ee602f439f4ec1012c2cbc4b9eae73b234ac5d4982fc0128712492e8909e
    .elf linux x86