General

  • Target

    dc5391ffcdf02705c86680dcfef0c8d0dee7d19c129653ce9dbe8b1568eeaf96

  • Size

    97KB

  • MD5

    2702c487f967a81d7769ed89c49e038a

  • SHA1

    73386d854964233402af13572fbe300fad6f23b5

  • SHA256

    dc5391ffcdf02705c86680dcfef0c8d0dee7d19c129653ce9dbe8b1568eeaf96

  • SHA512

    79d0170e935174372ea5582f23f4cf90a1b7c6ed17b541746c97cef1e25096c5de69dfef5fb74c7f06cc44eade264f271026da6e4c8fe7c1696694a87b3d6f58

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogmEmmFVcqq0GnDZT:VK7DDeKlogmEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dc5391ffcdf02705c86680dcfef0c8d0dee7d19c129653ce9dbe8b1568eeaf96
    .elf linux x86