General

  • Target

    9330073b5e3e5ac1b01fa8a73f2e130e9435a8e44fc590931f93a2fd4fe84ff2

  • Size

    89KB

  • MD5

    f1242a7afc88bc6780a7c8b9c85e2a9d

  • SHA1

    59e2a4141a0c6ec79b250dd09b5ecd006ab606e8

  • SHA256

    9330073b5e3e5ac1b01fa8a73f2e130e9435a8e44fc590931f93a2fd4fe84ff2

  • SHA512

    2c2bc534c85367789966b223d5e10c435a9c85990465d619a2fd6f1acb990782965a9c6169ebd038a5978b33e1cd93d0a1d176903d90c28ce77342018eb51c27

  • SSDEEP

    1536:TF/snp30wyeBb4Wb6lKeyYydR4QIcy6KE6mgMatK0tc4POGEg0qc:m50wR3OlKeyYydbIOgx3tc4WGEg0qc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9330073b5e3e5ac1b01fa8a73f2e130e9435a8e44fc590931f93a2fd4fe84ff2
    .elf linux x86