General

  • Target

    71463ce8501517a60661cac32036d02de2ad712c6485ecfbaadd92f658b47d09

  • Size

    103KB

  • MD5

    9bb5b8b89fbee81cb6428fd560fd091c

  • SHA1

    b5e851ecaa35dbbdf1a8e51d580bf3c6404824a3

  • SHA256

    71463ce8501517a60661cac32036d02de2ad712c6485ecfbaadd92f658b47d09

  • SHA512

    71bd64fb00a2ed9ea67af28fe3ab322acc0bb81290c8b850a57fdc1902d59e801747dc85640294a5af0554109f512550c56e595eb3fe83c1287308f27c93bdb7

  • SSDEEP

    3072:Pshnq7z7UQfXOvyaWr/vQxfo7mqomcqqzdnjLT:PsSDeKBExfo7mqomcqqzdnjLT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 71463ce8501517a60661cac32036d02de2ad712c6485ecfbaadd92f658b47d09
    .elf linux x86