General

  • Target

    2812c6bb2be2303931ea05264d76dad214e32384d5d7fbd30c6a41b8bf0bfcfa

  • Size

    97KB

  • MD5

    9808bc5b5bae6bf8a71566d8f52a8219

  • SHA1

    7b62e5e21080c0b84fe8f157bd08de5ac6c06d68

  • SHA256

    2812c6bb2be2303931ea05264d76dad214e32384d5d7fbd30c6a41b8bf0bfcfa

  • SHA512

    0cb99e5f0b7732705845712285e02ede4e7d649b08d55a18b7ea04106ffa5e9bbcd26183d0071fdff0a4f353bb6d600412860d36f2dfcaf2c74dda2d8f667a3f

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogKEmmFVcqq0GnDZT:VK7DDeKlogKEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2812c6bb2be2303931ea05264d76dad214e32384d5d7fbd30c6a41b8bf0bfcfa
    .elf linux x86