General

  • Target

    e7e44c3ef64764e060b022fda3c5a3af4d5bd5964c8692311c52d139ab89619a

  • Size

    72KB

  • MD5

    b629573d3128e2a474efb0ebd64aae30

  • SHA1

    dddbffa05b1fb9003eb135226cf9e59fcdc65aba

  • SHA256

    e7e44c3ef64764e060b022fda3c5a3af4d5bd5964c8692311c52d139ab89619a

  • SHA512

    7fdb9f492ce817fe8c61c5cbb84b873122ff76c1c6c40fbf3b54f36197e5428824c866570212cacdfbd50527ef63dba24a673e52c72698a3dba645f8a896c55a

  • SSDEEP

    1536:nm+c5osQWiKLoxKFn6pD+OTxzMxMmLI2VOCjXUfJRk:45omr0xKFn6J+OuMmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e7e44c3ef64764e060b022fda3c5a3af4d5bd5964c8692311c52d139ab89619a
    .elf linux x86