General

  • Target

    b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0

  • Size

    120KB

  • MD5

    0a952341b69fb198c2d579f82b79ca4e

  • SHA1

    8ea821a6103d1740dd297c0dfbc5ad621c36951e

  • SHA256

    b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0

  • SHA512

    e50fd47cf605e9c3b914151e5ecea7ac0f25c33b07a894c3d473bf3ba4c64568ad8198935937667ca8b6516143adad29d1805231320dc5c1dc70f1b37312bb35

  • SSDEEP

    3072:UdYFMLcP3qehtsTzpHVPy7JPGREYumqMVcqWl2njTm:UuFZP3MrPy7sumqMVcqWl2njTm

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b2c1e3fc824b1f924a89154269dca7bd5848131a279f49a4d40f11328a5b30b0
    .elf linux x86