General

  • Target

    c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323

  • Size

    98KB

  • MD5

    29fbba9f8f28778c5b1178815c45a577

  • SHA1

    9704724177cb6321f3986f23cbd6cb0e5c837337

  • SHA256

    c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323

  • SHA512

    c24b60a72685137d1e51b01770004ba46f7b50309e3db6d68e1a3ca84b03a7fbd5b1fb138494fcc280fa998f054abd5da100f846036e147641231739262a9523

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqgMF1QmqoVcqq6GnQOT:heZyo5KqgMPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323
    .elf linux x86