General

  • Target

    9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63

  • Size

    113KB

  • MD5

    5512c7cd07c3ede2012f303bf89a16ad

  • SHA1

    9c992055eacbbe9f7ed0849ac2a0d0a4491dd960

  • SHA256

    9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63

  • SHA512

    0efa746778416531bd5bdf611d66ced28ee73093db6ae7d715e1574dbc012709dfed2482de48e09d3de32c23cbfad4296bdf54d6a09a914eb2a3557fa42df082

  • SSDEEP

    3072:lLQ5paFGq5PBSVjDW6kwh2LQ68E97JEXPk7fD162kzANTjsEmST0nYXbg1DE:l03+5PBSVjDW6zNu1EXPOfD16293sEmo

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63
    .elf linux x86