General

  • Target

    keksec.i5

  • Size

    106KB

  • MD5

    9dace48c21298224f9f9156ac55229f2

  • SHA1

    2568982411bf591fe461e75ed82cd4e95b01f383

  • SHA256

    83d4777dfb7706d2a9d21b209f59e9b87790b0770faf7cb0da69446139237b1d

  • SHA512

    0f3968586d50e15950e170acb50acb6c7a760074f4e48d989f0851a99eb71471e97e489098b1355ca4dc6dddcbc3ce9848fb33ef604d2b2b6de1b3d766a6c34b

  • SSDEEP

    3072:+TM2sE+nUCSQ2f19zrck41bT+yK1mAMdZ0dHtHHBJt:+gn1EXX41bT+y0MdZ0dHtHHBJt

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • keksec.i5
    .elf linux x86