General

  • Target

    6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3

  • Size

    116KB

  • MD5

    022e744c68cb443cd33a2c9278d899c9

  • SHA1

    5e231b22652b755450258464591c6216a34f3815

  • SHA256

    6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3

  • SHA512

    a5fb58c79df67e4e05c807071431d1f31edbed8f2d70e8e8975cb95112326debf5dfdbe67bf5300a2595311be31c1befc1e4b7f663d6d3b821e0efffd116cff4

  • SSDEEP

    3072:KGR1eOtJ8AAWS8oJMetJ8au49QuTsSjTAeDvgXBtcZkG7gyqc:KoyxIoJMetJ8au4llf5gXBtcZn7gyqc

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 6b9bf7adfe50a9b88917e30915d79e917a5e0e8c7bed1556a40f73b2e92a9be3
    .elf linux x86