General

  • Target

    d9b20b7fc4ceca548330b1c0258052eb911ffbcd250cd690d1e8b047e35e01dd

  • Size

    107KB

  • MD5

    9dc9ab5b9b55c13ee4c56fd80760f156

  • SHA1

    7946656632e07b60c704e2d1ab8df69a96f97c7a

  • SHA256

    d9b20b7fc4ceca548330b1c0258052eb911ffbcd250cd690d1e8b047e35e01dd

  • SHA512

    96ac468a0247bf64a50492ad0cbf4df9d0ab5190b0fa7c0db8474b8e9bc43ece8ab915a2a8cbeb7a4fa02e4cc75226fd91fa7c93390b49129c52d0c3d82f3134

  • SSDEEP

    3072:Tbv/mL+/VpshGc/0G+Jw5h8YJN0DLoc43D1Ra4xh:TbXcabBG+Jw5h880DLoc43D1Ra4xh

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d9b20b7fc4ceca548330b1c0258052eb911ffbcd250cd690d1e8b047e35e01dd
    .elf linux x86