General

  • Target

    e6a27b7564ea985ea752a1ed31ccd968a32eea3853b75d484f8178ce0b545f65

  • Size

    102KB

  • MD5

    16f0b14174048a6c04398d2ff65c36d5

  • SHA1

    5966e2d12557fc9b2afc5e277e9809348f4c09dc

  • SHA256

    e6a27b7564ea985ea752a1ed31ccd968a32eea3853b75d484f8178ce0b545f65

  • SHA512

    9aa24d539c500eb30b5b65c9aacb50fa48e4f4f3cf0299c0e9f417b1ad86a31f6638c86a288e280d154d2808c79c8cba98adf15289bbc7f34ab36f487d9d6ef1

  • SSDEEP

    3072:a9/PUkZE987fbR9ZM+PXW5OdhQj4tJ8awMjemiYVO8wYbMau:EP2qtw+PGkdk4tJ8awPmiYVO8wYbMau

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e6a27b7564ea985ea752a1ed31ccd968a32eea3853b75d484f8178ce0b545f65
    .elf linux x86