General

  • Target

    7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258

  • Size

    123KB

  • MD5

    08d2f73394472a2a059a6042fa939f98

  • SHA1

    cc72f6ec8e6e01099d55bda2ab94496e39710f56

  • SHA256

    7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258

  • SHA512

    8b892ad82b00ab8c7e1afe79db48b105f836c0e8230469a68ec81c1205a776de538df43032394e4a303a21635df1f42b5d5aad2e476da9bab743879e7f0e63d9

  • SSDEEP

    3072:DrgI/UEdiUqvLIaoEAgBPoP5+kINGGjqAmqoYcqL/hnIT6:DrgI/8Nvc4VggNGKqAmqoYcqL/hnIT6

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 7ed9300272482e265a5deb93dac9bcf9381b1edbe58ab1b40578e3c2b9874258
    .elf linux x86