General

  • Target

    8fd84082ff21e5b7d17c25c904bf92118882d23fb777f253899f8daac1703f74

  • Size

    106KB

  • MD5

    4b2fac7e7a763ef620361fe27ba5f859

  • SHA1

    7ee39f86479dbf6d27da90dcbe248377c8bb318a

  • SHA256

    8fd84082ff21e5b7d17c25c904bf92118882d23fb777f253899f8daac1703f74

  • SHA512

    3c9b88f6f15058b27a3720387917607993949cefdc58a956303a30b1bbf6108ad9bf17cb493ebe8e597c80287a094d4adae76bd623b2a2f350b301538202359d

  • SSDEEP

    3072:6+nmu++2HEavWkxEX27zZG2MRD5FE4gqtaaCx4:6+8+wpS+zZG2UD5FE4gqtaaCx4

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8fd84082ff21e5b7d17c25c904bf92118882d23fb777f253899f8daac1703f74
    .elf linux x86