General

  • Target

    keksec.i6

  • Size

    110KB

  • MD5

    761ffbe612aa1c5c730b4c8f87ae023c

  • SHA1

    603180b5649b71ad38bddc38b2b23c549d5a563b

  • SHA256

    41c5f57ead0c2844cf5415377a914ab1aba0693e7a93160fbd0690418c396414

  • SHA512

    4fdc1d8bbcd0032c77023af3d83d333842f197e4c893ccde98974eb5791319dfeb8836dc825ac1b0a6722663de675ba57c248ae9fb11da508f3f0453623aa700

  • SSDEEP

    3072:sDyOg5TTaj86iJR9QT+rPxmzbdZ0dHtHHBJt:sTeR9QT+rPQzbdZ0dHtHHBJt

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • keksec.i6
    .elf linux x86