General

  • Target

    e9302458a90b6c4f841c2cb153ab97bc9dc7202f9c49da818767b26a41f2e835

  • Size

    101KB

  • MD5

    85f2b695ee98f0840ba13d3b45786647

  • SHA1

    751b65c48302b82b07246288a62f2dd145701838

  • SHA256

    e9302458a90b6c4f841c2cb153ab97bc9dc7202f9c49da818767b26a41f2e835

  • SHA512

    0f3dc8726f5bf7259803d97f019f13d17a775d4cc8b6005bf5c5631d1d36acd376093bb00f636d8ca52c64ddfccb6c39df91b6982d64e2ac98ff0bd0fbc37ea1

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fnHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fnHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e9302458a90b6c4f841c2cb153ab97bc9dc7202f9c49da818767b26a41f2e835
    .elf linux x86