General

  • Target

    f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361

  • Size

    103KB

  • MD5

    a5fcffb0919d4c4c16a059c89264213b

  • SHA1

    4f874325ecc1f4ac0778f6c7155fd98900b926d7

  • SHA256

    f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361

  • SHA512

    449c89c4f2e27d6c33ed51b20a9fda18e2fd546a79d1676848c4be8a12f7c7559c962288a19f4d9dbbb9f15654b799a6fe0262741e5b0c5791e38754eeeeb283

  • SSDEEP

    3072:drrMiZYMk3LsGMJicW5OdhQj4tJ8aAWVMmiYVO8wYbMau:dTzJivkdk4tJ8aAnmiYVO8wYbMau

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f6e8d9ce0086ea7f1793f0e6512322358439183977ded303a19f604443cb3361
    .elf linux x86