General

  • Target

    6ff3f4f050d403a881f7b527896dadf4571663d81b1fd169dc69b99946a60f52

  • Size

    98KB

  • MD5

    736836f839f6366529fc9898e0d87e67

  • SHA1

    68e3f98f946c2d349806a5b844f9441003efac23

  • SHA256

    6ff3f4f050d403a881f7b527896dadf4571663d81b1fd169dc69b99946a60f52

  • SHA512

    d7f4c38258bf9aad81bd273b725526b8cc44852424118ddbab1f6e3f19c24443875a25d3c3e138fd58801e5573f0e50797e503a86773088422d6fca991605e99

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqe/F1QmqoVcqq6GnQOT:heZyo5Kqe/PQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 6ff3f4f050d403a881f7b527896dadf4571663d81b1fd169dc69b99946a60f52
    .elf linux x86