General

  • Target

    518668d64e5e5ec824bb002f8860c4142f0cacdb8e72a9f76b73ae30f1474007

  • Size

    582KB

  • MD5

    209ba67384a7ac63e20111bc58423ba1

  • SHA1

    e99dff8c2a30b496d57d7898f2e43e9f204a7d5e

  • SHA256

    518668d64e5e5ec824bb002f8860c4142f0cacdb8e72a9f76b73ae30f1474007

  • SHA512

    f0e07aef6541bbb0333a81deec0c55731c4eb7eb2a66fa60a46b7e96643040e8fa9194216a35c68a869e6080e9b3d9a36b0230e443f0f889b416273578e27073

  • SSDEEP

    12288:Rjv+PNgpcD71LME2dTQDKZ5FGtp9ZvQgQqjAVdqpzFXnQxpQZzPn2Nldt2k:OPZaTGKZmfvQ7qUdqpzF32pQZ6vr2k

Malware Config

Signatures

  • Detect Mirai payload 12 IoCs
  • Detected Gafgyt variant 12 IoCs
  • Detected x86corona Mirai variant 2 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 518668d64e5e5ec824bb002f8860c4142f0cacdb8e72a9f76b73ae30f1474007
    .zip
  • 89.42.133.67/armv4l
    .elf linux arm
  • 89.42.133.67/armv5l
    .elf linux arm
  • 89.42.133.67/armv6l
    .elf linux arm
  • 89.42.133.67/i586
    .elf linux x86
  • 89.42.133.67/i686
    .elf linux x86
  • 89.42.133.67/m68k
    .elf linux
  • 89.42.133.67/mips
    .elf linux mipsbe
  • 89.42.133.67/mipsel
    .elf linux mipsel
  • 89.42.133.67/powerpc
    .elf linux ppc
  • 89.42.133.67/sh4
    .elf linux sh
  • 89.42.133.67/sparc
    .elf linux sparc
  • 89.42.133.67/x86
    .elf linux x64