General

  • Target

    2d07cc99b4f148c63bafdbe7897f2afd351e1c978e34f8ec7cbe7d856e5a5483

  • Size

    101KB

  • MD5

    a59061885bc52afa0fff26c3ee2eec84

  • SHA1

    9eb95542e330a3cfa5550510850ad5121669f01e

  • SHA256

    2d07cc99b4f148c63bafdbe7897f2afd351e1c978e34f8ec7cbe7d856e5a5483

  • SHA512

    9c450d68170016d1c9c4973ab349069f88f255a17b14be948de1dc4860e7ae2505223d86ee7ec85f23bfc38d2efeb2262e3559fd771dcbbbd7b1d94e7a38cdb3

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4foHmmFVcqq0GnDZT:wJFv4Lm6AJ+4foHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2d07cc99b4f148c63bafdbe7897f2afd351e1c978e34f8ec7cbe7d856e5a5483
    .elf linux x86