General

  • Target

    b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887

  • Size

    120KB

  • MD5

    1c031113bc05e5d5f33d56370a700603

  • SHA1

    ce76e798b570cd2de11065fe77f48173aaa879b9

  • SHA256

    b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887

  • SHA512

    03b7a0f8fee1e3869ddd8f027b38c6e71fac06a20c117c249016ef08483b9185b8858f63a634ae62f1db2c3127856de8cf31fbc4c0daeac3bf91ba8a3fce5732

  • SSDEEP

    3072:RWIIeP00LTSyYSX0CPiFYyD8aAmml8chTj3aKYuM:0A1d1yD8aAmml8chTj3aKYuM

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b5b614c95e212bc60b63ba4738bbb2b05c5f80108c9525aab00f33c760d62887
    .elf linux x86