General

  • Target

    8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412

  • Size

    106KB

  • MD5

    60223738106f7accc114a9644394fa95

  • SHA1

    d88f03e7ca61e77fe203d9a4b5f0dc8f36e05b4c

  • SHA256

    8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412

  • SHA512

    43b87d9697225ff275cd3e76b50df340aed8f27419ef5a57960befc414bc6f7e18b650bf28dcc1685f351a61c8a984c55a8ef6480bc3ad6237648760b4d10a61

  • SSDEEP

    3072:99tgMufhwBtalCBYme8TohmqomcqqzdnjLT:99tKa/BYme8UhmqomcqqzdnjLT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8efe3ae35c02b91e4ea6a55b5902b3de0bfa3331e750a88375992504958ab412
    .elf linux x86