General

  • Target

    c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e

  • Size

    122KB

  • MD5

    450841d40d55add69aae9df2014e7acd

  • SHA1

    616555a56e1fbd13f858d867add786dac2fff8e9

  • SHA256

    c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e

  • SHA512

    b9200b7ef1b9ddad4a0982bd37b916eaa70168bfb9a10668112af6fba5031f3a2a0c7c1046601a3933880b796bf2989805a9d2b6d24e6b87a53c2a55a0a61350

  • SSDEEP

    3072:JmCiYwWSZkuYvg1+Ny0etJ8add9QzTs7zXUt4NKcXeGcgqGK:JdZowoSy0etJ8addQ4kt4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e
    .elf linux x86