General

  • Target

    840800f05b70731896da86bd2ce59bcf2609e5ab873698bfbb533735e9bf49e7

  • Size

    98KB

  • MD5

    64ae1f8c13363826cc2b28b68deba183

  • SHA1

    5ebdeb914b3432205bac0633b7ed40b552f570da

  • SHA256

    840800f05b70731896da86bd2ce59bcf2609e5ab873698bfbb533735e9bf49e7

  • SHA512

    ac4dbee8f21c00ef3bc6b8724d6e124ad7f6a28d45a902cd19c9889f344d601d3d24c899d46301edf07a4a04838427dcca3f80cf6638343998ae2a07f9356676

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqeQF1QmqoVcqq6GnQOT:heZyo5KqeQPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 840800f05b70731896da86bd2ce59bcf2609e5ab873698bfbb533735e9bf49e7
    .elf linux x86