General

  • Target

    5c27875c0b879bba92e5ffd0850c204b164de876e7501acc541b3f1e73a8ff51

  • Size

    92KB

  • MD5

    c8223a49b232aa3c23d5481807077750

  • SHA1

    5dbfb155a1bc290a5702e88dd64cf4dbb490c4de

  • SHA256

    5c27875c0b879bba92e5ffd0850c204b164de876e7501acc541b3f1e73a8ff51

  • SHA512

    133d0cc163ad1b88c278d4edbd41643991b67d85abc2ba6a674c2d4af9f195802a15fa4f1826421053b07007781e96a2d7cd84039d3f465156de6dd1c6a862fc

  • SSDEEP

    1536:0WbDP7BRUVU4e/izb6C/Qdk5cc/z4d7J2cNU5mZ5hvV7w882PM37K8PN2UrYe:Db/LUVUTqbpQdScc7M7JFp5hvJw882Eh

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5c27875c0b879bba92e5ffd0850c204b164de876e7501acc541b3f1e73a8ff51
    .elf linux x86