General

  • Target

    edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46

  • Size

    98KB

  • MD5

    ba029fbda3883d69aee9ce5c98a5212f

  • SHA1

    ee8e943873d3590b9a7dc499e27df16e130c0a41

  • SHA256

    edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46

  • SHA512

    808d651c456b71b15daa055150485306f0fa983dd3f5b148e98f2bf4711cfbd029df662ea9f2af4441e552a910fab29bf3e982aedc71dd43f22013e8ac8c6c82

  • SSDEEP

    3072:zWnTrUjUcULzGEZKZmyvM+Gs9G52RDc8DBK4IYj5hMS7:wH6XsKEaEt72RDdDBK4IYj5hMS7

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46
    .elf linux x86