General

  • Target

    56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65

  • Size

    169KB

  • MD5

    07e4ca743d8640e489055f937e99f004

  • SHA1

    259c08223ca40f148f0d320e3db0a9151da0c041

  • SHA256

    56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65

  • SHA512

    7903c016d650dd9de3063f9d91a003c4d3801d3500f92bed9115690f607885b7223efecae431e41a03de7b83958df54bddf67ffdae07d09fc507e26c868fea74

  • SSDEEP

    3072:9YnhV9p3uOUnQ0ZyBmR7PL8RetJ8aIfhg8mYsOltGhKlxL8exuXiH90PfNatph1:AV9n+wof8RetJ8aIf7llcOQiH90PfNaP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 56e85a14073c26b6986acfaaa9c5240b04c6940abf30764b8215ee84c3951d65
    .elf linux x86