General

  • Target

    eeb802fbbce9d8f7724d17d327c3f7dd53e505e1c4147d677ad84008dd4cdb92

  • Size

    88KB

  • MD5

    7ba91a28bec6bb0bae143c928f965381

  • SHA1

    9d4d473c6727556982d4c791514db53558c9a76d

  • SHA256

    eeb802fbbce9d8f7724d17d327c3f7dd53e505e1c4147d677ad84008dd4cdb92

  • SHA512

    5d617519b97b754449752a243d91ef9cd5f0fce80c90e144cbbae0081841afa873d27e606e7e5b1156edd8a1a18b3d06e3e1a4557fed4a8c1dcf38fba1c0c09a

  • SSDEEP

    1536:yaygTX/yd6PK4VjIWUFctnMWWKBwvbBLbG6CPMJKIgYCWm77XkcaP5VgYAB:yyX6d6PK4VjIWUozWvbBLbG6hgIgYtmD

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • eeb802fbbce9d8f7724d17d327c3f7dd53e505e1c4147d677ad84008dd4cdb92
    .elf linux x86