General

  • Target

    fbed7ee35cdededc34900a64bb6f72a38697a05aa6fc90cc5fcdc995fc725e92

  • Size

    98KB

  • MD5

    b800acceb07a57740832b66b9e0cd176

  • SHA1

    f383602ff5e757d84a698cd9504cec697926d245

  • SHA256

    fbed7ee35cdededc34900a64bb6f72a38697a05aa6fc90cc5fcdc995fc725e92

  • SHA512

    3697f31566f058cab92ad103d4cfa92ef27c14e88e6b62551d72fc1912a16eb1f4d29c9f6204d8e5614f5ca96598ae8e7a355e10005cb2ad66923dcf242131e6

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqeYF1QmqoVcqq6GnQOT:heZyo5KqeYPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • fbed7ee35cdededc34900a64bb6f72a38697a05aa6fc90cc5fcdc995fc725e92
    .elf linux x86