General

  • Target

    f617cc382a091fb812286dbefff67108ab18e5a5ec7e007892122fd675c582b6

  • Size

    118KB

  • MD5

    16dab6930534c8df8fe2029949987aa6

  • SHA1

    af1c3d9b2aa0709d57f8850ec237a9b023a6648b

  • SHA256

    f617cc382a091fb812286dbefff67108ab18e5a5ec7e007892122fd675c582b6

  • SHA512

    fb918ebe1f647a4108e3aa5307306fece58008a77a2f4a18121cc707fbc0783f5aea532c8bd7e29f5643649c58b57248650b5d79f341e885d0258e6f471fb140

  • SSDEEP

    3072:N0PHTKr89vujAjq/POr9+n7wtmUQi54j9zQzBmTo0dVJ4VsKb:6Tb9vujAjYP847w3Q9BzQzBmTo0dVJ4J

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f617cc382a091fb812286dbefff67108ab18e5a5ec7e007892122fd675c582b6
    .elf linux x86