General

  • Target

    59ec208ddeb1bc4996767df6f7ee9370bd4579464ef15567b90a2cce6b3b3904

  • Size

    105KB

  • MD5

    b96d0c8e234333843dc22f47346fd534

  • SHA1

    44f283d4d3b940083a9768d75a09da3de21e3f25

  • SHA256

    59ec208ddeb1bc4996767df6f7ee9370bd4579464ef15567b90a2cce6b3b3904

  • SHA512

    b1ca1e1ce8ed94f9087b8c38f197be79d788f7b0fa18b79d96b0fc70f9f0af147042f7164cc992b152367e61157c65b5d801bc4d6f0343e666d4a80b34582699

  • SSDEEP

    3072:6V3P7eFd39yfIR/RKBs2GQcfcBmST0LMBbgwIv:6tydtyQes2rCcBmST0LMBbgwIv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 59ec208ddeb1bc4996767df6f7ee9370bd4579464ef15567b90a2cce6b3b3904
    .elf linux x86