General

  • Target

    d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff

  • Size

    87KB

  • MD5

    92c22c27ea8649b7222c6f561cb50d46

  • SHA1

    580422d4810226a835d9a6d73b5a9a96f45bc142

  • SHA256

    d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff

  • SHA512

    947286128d7d6221e49bb58b79fd36a7e47f8e234248fa9173395062ec0516a04b56037128be353f8272d562b776d79c661eada247316fef3ae0154203ca422a

  • SSDEEP

    1536:SYxU08RDUi8MXmM89Tvnfhd0hsQTkJluFvw5LaSPsLOnPGJUkft3LR52wm:SYIR3WPdvnJdapAJQwxacsLOnOJUkfxq

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff
    .elf linux x86