General

  • Target

    828a1099a2440233f75efa44a0936900f8f824561ae87a06a8cd17d8e40b9e3a

  • Size

    97KB

  • MD5

    5baef1f8d8ec6af9ab663b54e78c15d3

  • SHA1

    36222d57e8903a3957332f8d4416e3bdd02e8a13

  • SHA256

    828a1099a2440233f75efa44a0936900f8f824561ae87a06a8cd17d8e40b9e3a

  • SHA512

    c17b57cdbd32eb9a76bc5e1da80139d3263f14aedee9efe38be70cc2899629fe8eaf6ef2199889f94391a5b978de445695caa17d1c9ae3f1e96d71c0771b75c0

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogbEmmFVcqq0GnDZT:VK7DDeKlogbEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 828a1099a2440233f75efa44a0936900f8f824561ae87a06a8cd17d8e40b9e3a
    .elf linux x86