General

  • Target

    405c65b775f22f6ada45f72e2c85158334726aa842b12d9cd3774b6bc1494bb6

  • Size

    93KB

  • MD5

    0e765d00f0ee174e79c81c9db812e3a2

  • SHA1

    a04195848e840cf4038446c0c883ca116ac62135

  • SHA256

    405c65b775f22f6ada45f72e2c85158334726aa842b12d9cd3774b6bc1494bb6

  • SHA512

    f3cba2668550279bfb0fac2539f5fc3d1d101aecf1fa24b71e85a6c43a7ea402844e6851298616c6b0a81b5bb3a7213d47984e4ce58aa13d8ae196c77fa90025

  • SSDEEP

    1536:1W7a4jEmUQUn0D9MQSC/vd4xcnULCDA4NG64mb5hRHZZZXLN2PM37K8nN2Ur3e:1WLVUQU0OQRvdicnscA44e5hRHZZZXpO

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 405c65b775f22f6ada45f72e2c85158334726aa842b12d9cd3774b6bc1494bb6
    .elf linux x86