General

  • Target

    26268a23ac32b34e16108703cc7f3e4702c9f8a1f16bcb9377218476c11d6276

  • Size

    101KB

  • MD5

    d69fd21162c3fc0abaea94305bbeb8ce

  • SHA1

    5477831d89b9b386213cce189d1ea855dcd84fae

  • SHA256

    26268a23ac32b34e16108703cc7f3e4702c9f8a1f16bcb9377218476c11d6276

  • SHA512

    37e5039bc08e9e072581e1f51eb8dd0842e791381e3e914741129f2ca21968d74df1744b5cd1a7568863556619cf79a1f1a1266192c6ec2941fa399f2a9cfd94

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4f7HmmFVcqq0GnDZT:wJFv4Lm6AJ+4f7HmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 26268a23ac32b34e16108703cc7f3e4702c9f8a1f16bcb9377218476c11d6276
    .elf linux x86