General

  • Target

    d0862a4ff5e6f54ae5d724f3f678d07f26c84d74af0c4e8cc1ad26881cc2a169

  • Size

    89KB

  • MD5

    d99c5d4f2150632d7ba454c923f7b06a

  • SHA1

    b2cf97bfee013b2b9be1dbfd0970762439debe1a

  • SHA256

    d0862a4ff5e6f54ae5d724f3f678d07f26c84d74af0c4e8cc1ad26881cc2a169

  • SHA512

    3c239f3a9fcb3e60d41124059c1510e7386d97352db1ae3e4b01486659467d6deaa23a03e29d452e0e62713d16ee8abc685e7cb12e605b9d950fd528b1f78be6

  • SSDEEP

    1536:mz9/R34JO8JclUX0ZWNMDyIZuUdfwY33h55h5jlJsEWshe0QzUzJYQ2Wk:sRV8JclUfCDyIZ9dfwUP5h5pWUe0QzUy

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d0862a4ff5e6f54ae5d724f3f678d07f26c84d74af0c4e8cc1ad26881cc2a169
    .elf linux x86