General

  • Target

    65c000127835cd53ffb8c0c91dcc5cd2166d307b2af0145587780034f78a7ff6

  • Size

    97KB

  • MD5

    15f65ba2db6039ff4e83c65234874d87

  • SHA1

    1e25d757409e9d9bf6a03f93d0935fae11d7a043

  • SHA256

    65c000127835cd53ffb8c0c91dcc5cd2166d307b2af0145587780034f78a7ff6

  • SHA512

    9851c3c4db7c992f63484438f856582e5422af25ddb78a7309a3d343dec72f414c4fd98da80796d8da18bf7e434fad8b6a9f095ec6fdc95d53e78b287cf84f8b

  • SSDEEP

    3072:+xcXUeUaUH9e8jrd/qNI/fsl/M9lbx15hWyxqVFinF0OzipoQV/y:l3vU9e8jrtqAgibn5hLoinF0OzipoQVq

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 65c000127835cd53ffb8c0c91dcc5cd2166d307b2af0145587780034f78a7ff6
    .elf linux x86