General

  • Target

    50b82ac4c85206858059255e14b808a88aec7188c8e53cbe3bc4288d6d6f78cd

  • Size

    91KB

  • MD5

    d769cb600f80eb5caba34cd39e9a772e

  • SHA1

    71dae886f2c745c13efb529354897fafd9dc8bdf

  • SHA256

    50b82ac4c85206858059255e14b808a88aec7188c8e53cbe3bc4288d6d6f78cd

  • SHA512

    189de35325d39a8c93779c52e401466728bd0434e74cc9dd8a42743ff8f069387beed3cee437ab579b2c4558b0f5852e9e39cda1fbf50c369855ef6829fdba24

  • SSDEEP

    1536:h9O91OMJIUeUN3NCa0LUCWG3CeQoQcr9lh3aNXoc21WE79Uw/ZrB7QmXV4QIY218:h9HMGUeUNEa0LaG3jQoQsDh34OoE79Us

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 50b82ac4c85206858059255e14b808a88aec7188c8e53cbe3bc4288d6d6f78cd
    .elf linux x86