General

  • Target

    ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62

  • Size

    75KB

  • MD5

    4c6922ce2de3149f24403df2b92214af

  • SHA1

    3f391436cb09a114d9ef9fd2f13d1bb78d7502a1

  • SHA256

    ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62

  • SHA512

    e03bb2abb2f61fab3d6d7f4d9d500672a580ac2b17d7a56d5339e2551b6f8e45590f3852ede7b69105617b7cf60a9e6f2642c936efa7b6b10d1eb9d4d3b6f51d

  • SSDEEP

    1536:/ZPpN8UdU7UL8gcEX40f+66w+fDbD06O4QzIfCqVqLzKQyDmIJhyE3GVKbZV:/ZhN8UdU7UL8gcS40fV5+fDfP9zCTnxO

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62
    .elf linux x86