General

  • Target

    9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe

  • Size

    126KB

  • MD5

    94610e335af56420a268d2919d164081

  • SHA1

    537b01a4dcd554a5718a41346f7edca1e642242c

  • SHA256

    9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe

  • SHA512

    11fdf4b43b89827ce21665d85861a569375a2b85985687cdb68032f5191d9efffe9f2dacacd1ccc378e383ace48c2c7c2d998f8262c18cf3026cc7153aebf88e

  • SSDEEP

    3072:H+te3cWiXFrnS9OxaSetJ8add9QzTsUDTbDSFot47KcX6GcgqBK:X3gZu+aSetJ8addQbDn5t47KcXJcgqBK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe
    .elf linux x86