General

  • Target

    773cd9711fc9f96fab96e9fda14ba2a2

  • Size

    87KB

  • MD5

    773cd9711fc9f96fab96e9fda14ba2a2

  • SHA1

    0e6a5be98b0cddf6c9896818e7efafda9891da43

  • SHA256

    91d5891cd2b467642759ff22950cec4d160f52c65cd49f964e3f34570edcd122

  • SHA512

    5f72f25ac4b25e2b3177871c14f33700499b4553eae3f2c3145d14eb9c0839e1df2b18698d29f12108408aa5be78a5c86d2dfde07d2d8d928506bd784a55dc61

  • SSDEEP

    1536:eyIJdv/tUYUeG2WBiLfWXGJ2HLO3FrcLwo3mWzWWW/ykQVtXhmL+bVOP43XfppG:IdvFUYUeG2WELfWWJ2SVrEeTQfXhmKbe

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 773cd9711fc9f96fab96e9fda14ba2a2
    .elf linux x86