General

  • Target

    e95596b5c6cda8005d9b49159572693d0e96126cb0ce52b5908c6c27f554d5e3

  • Size

    124KB

  • MD5

    0d382b358c9ef778245ea0634c30e08b

  • SHA1

    9e03dd4a4852bcf64a8c6f4481f7e286a4702ace

  • SHA256

    e95596b5c6cda8005d9b49159572693d0e96126cb0ce52b5908c6c27f554d5e3

  • SHA512

    e7e380ac62246815381bc0a915270edb8709a2956a00bec826b67dcc58fd6a328f88f0c88f8beebb9b4283b2f2b672f8f84ae33cbfe554f83b42f1f96aef75ab

  • SSDEEP

    3072:w7q5LBBWrvUt64i3zYB6LG+FZAwXvDLoY4giAGaJpP:w7q5LBa06PMaXZAIvDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e95596b5c6cda8005d9b49159572693d0e96126cb0ce52b5908c6c27f554d5e3
    .elf linux x86