General

  • Target

    b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352

  • Size

    99KB

  • MD5

    70bfc9d880e86b04ef1e1311f8b343c0

  • SHA1

    5376786824f2b8bce9a20cb032dfa15d63bc4ba7

  • SHA256

    b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352

  • SHA512

    88ba1e897f829b5d6bf06170fe24b474b1187f92e2ac42d59b00e09cab1c0802db791bed40ebc4ca2babe3e7de1e83e8dea4d7f1157b2fa1595644f5f5ee267a

  • SSDEEP

    3072:OkH9VoT7QbMAf8vN5h7+zWXYy0Oz/FQQ6uN:OCsi8vN5h7+6XYy0Oz/FQQ6uN

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352
    .elf linux x86