General

  • Target

    b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45

  • Size

    97KB

  • MD5

    2e30856a66b85192aa020462c193c8d3

  • SHA1

    c906e51a7070a64152a12f31ccdc4441fd3bd5e6

  • SHA256

    b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45

  • SHA512

    9ac32c93fbc39ec42e11913b95e76223f096ee601162f45fcf40caf47ebee6c57d0795c1867965de84eeefcc947931210c48f86d3dd6b148f828c46bf7ea67f0

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogLEmmFVcqq0GnDZT:VK7DDeKlogLEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b20e97245868ea834780d15f414050f12a2a01c3b93bb20833ac38fc023ada45
    .elf linux x86