General

  • Target

    b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d

  • Size

    85KB

  • MD5

    a72e2c0dc019c491352b017e71b30083

  • SHA1

    fa2bbba81f802d1d96acf8090a03eabdd9c2916f

  • SHA256

    b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d

  • SHA512

    e7e61ddb04a7801012e46140f9836db36a9336c5eb37cb473bc1e77b25dc41c8a0bd94eff1590711542f64af3b0850f338b568bd5e27aa306bd82159015d2313

  • SSDEEP

    1536:f4rEUHe3QUzEPuTs5loupkqBYlww9k4cgtAPH15hCosG7she0QzUzJYQ2Wk:wrTLUwmYwup0wak4rg5hCe7Ue0QzUFYV

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d
    .elf linux x86