General

  • Target

    871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289

  • Size

    124KB

  • MD5

    9a8f73f34d7068422cb22483740ae0e4

  • SHA1

    ae81be318be96b511c2efc84e2e04659039ef793

  • SHA256

    871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289

  • SHA512

    ce86abbc596d5370b68e75e6e8afe2f77cba62911ace9f4b9f27760c7aaad475a98a71b4d358d3810d748ebb012cb329df4890b7d66044a650e5c3dacdfafeae

  • SSDEEP

    3072:DbU2LXjrhWWR45Rlj9ksetJ8add9QzTs9mTuLxJRt4sKcXgGcgqBK:P/qDj9TetJ8addQqmTuFt4sKcXTcgqBK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
    .elf linux x86