General

  • Target

    923aebd342b56e6ba1f063cf38d8f536bc0ea37fba9b7dcad9476656aa175926

  • Size

    153KB

  • MD5

    ac575fd67517c845dfffeee8e77eeab9

  • SHA1

    06eec4009fb45cfd66985bb4aa8627b23860c99b

  • SHA256

    923aebd342b56e6ba1f063cf38d8f536bc0ea37fba9b7dcad9476656aa175926

  • SHA512

    84aef19865a2b237ce1931664d5d3a3e562c654721bffea9156bf5d321ab4b5da22c1fdc94352ee041aef7be005babd69743b510053fe2072242dbb43757c77f

  • SSDEEP

    3072:HHM8oiMuAmZL1ONYs+v5SAhKOlt5hw5zxSSSOXH90PfNatph1:Hs8ozgRSAh5lJa15vXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 923aebd342b56e6ba1f063cf38d8f536bc0ea37fba9b7dcad9476656aa175926
    .elf linux x86