General

  • Target

    1ed7869294b19893782683628494ae0560c629f6fc75c1135c7752b2f90512b4

  • Size

    84KB

  • MD5

    40efea055819514be69cd34a55dbcc0d

  • SHA1

    da152b3d6c2591c6ae83e3ddc42a322f8221f131

  • SHA256

    1ed7869294b19893782683628494ae0560c629f6fc75c1135c7752b2f90512b4

  • SHA512

    5b02237f50139f673cabf5b960495593ffc1aee364e53ebf8417183c52864252467351bddec95b7b78f79ff1ae1207b967fb08dccd0b8da26b4e183cf0638e2e

  • SSDEEP

    1536:9YKlpUt5UdiXoYuePlv9OPh891B+em6SqUskNM2tOms7y0OzTP0xhmnk:KKwXU84leP99OPOHBAxC2tOmiy0OzTs5

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1ed7869294b19893782683628494ae0560c629f6fc75c1135c7752b2f90512b4
    .elf linux x86