General

  • Target

    1de477675b3245e028d9087c13ffc1e147c47e91df283db0ea133aec44a10335

  • Size

    176KB

  • MD5

    98e6ab580d46be3275b11de5a678e0e0

  • SHA1

    af8c14f37e7e13395afbbb0eb943e3319ef933fa

  • SHA256

    1de477675b3245e028d9087c13ffc1e147c47e91df283db0ea133aec44a10335

  • SHA512

    0e73ff85435b5666984825ff5e779496c6c12fa281140619e104f91e08fae2523a17fd2e5bc6dc6164f4cb184cad5b824acd898c4a2b3d9d5169a11f8874bcf4

  • SSDEEP

    3072:BZsuTCvJNqFj8eZ3W9ibcace79JKudyPxDi/kU/kCHtPh+54ozAGyRSkmd8NYz3y:BZjCaDWEbggvKCX/FkqhEzAGwmd8NYzi

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1de477675b3245e028d9087c13ffc1e147c47e91df283db0ea133aec44a10335
    .elf linux x86