General

  • Target

    5f434c63bfc8cced07ff5d574541f0aaf163d374cd783ba0fd90cf29dbab7bc2

  • Size

    96KB

  • MD5

    edbcf2938a59f4ad9013ed66a871a4c7

  • SHA1

    a9787d64d5605ca920a89043b04c90147da07f91

  • SHA256

    5f434c63bfc8cced07ff5d574541f0aaf163d374cd783ba0fd90cf29dbab7bc2

  • SHA512

    923e46809e3af89508582dc13b8b38bf5609bcdde7938501c7bbb6e176fc729a722e512db03594829b1849ffcc1930a2f3a765dd570e9cea1225c097dd667cdb

  • SSDEEP

    3072:ZvKzVPiQr6VkojQn/UG9XZtpSLVcagbgATs:wBiQOTcn/FztpSLVcagbgATs

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5f434c63bfc8cced07ff5d574541f0aaf163d374cd783ba0fd90cf29dbab7bc2
    .elf linux x86