General

  • Target

    c026876fd77f1bd5a7ec7dd428666fbdac2c1cd076b2fcc72376c66b0e69a98f

  • Size

    124KB

  • MD5

    ff61caeb0212bd6c006a432f6124249c

  • SHA1

    04289c53433b30ede68f2001ec692f1300864c60

  • SHA256

    c026876fd77f1bd5a7ec7dd428666fbdac2c1cd076b2fcc72376c66b0e69a98f

  • SHA512

    9f8324fbb772d1132f14a56ea362ba424cc84f4b609dd5f43fbaa1e647abfe2215d8832caac5b82663b189e30d3da37b069c8db81ced3c10ee1e06f73de4c9ab

  • SSDEEP

    3072:QbqCkOz3Uoi4iOnWB+yGe6vzIhuDLoY4giAGaJpP:QbqCVpiPV3Ivz2uDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c026876fd77f1bd5a7ec7dd428666fbdac2c1cd076b2fcc72376c66b0e69a98f
    .elf linux x86