General

  • Target

    85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c

  • Size

    109KB

  • MD5

    3a0c5cf7ef01e53645ee3f6931778314

  • SHA1

    061ead5417575e5d81e9775e8444f9eb448515d6

  • SHA256

    85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c

  • SHA512

    2db87a219e913f3be92382500af62cb8d71813b440544d06b2824d2e236c3b015e0098125f0f8b5708ed7a5d7598c9e26230f7fe3009c3a0072876875d72277d

  • SSDEEP

    3072:2G/PXUw9DCj1e5dLNgvXMbTpK9u9tcntmruOBmST0nYXbg1DE:/h9DCj1wdZgvO6u9I+uOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c
    .elf linux x86