General

  • Target

    f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d

  • Size

    97KB

  • MD5

    3cf8e676e74406b855441b49aa6a0785

  • SHA1

    eda89a8e22de7e8a8a16524262e6d76dd1202059

  • SHA256

    f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d

  • SHA512

    8806f16d163aab3c76faa51ff3386ea512e4d784d4cc215719af9b326a5a5c70a9aee398217e4c7f40733933d87d3d2fee3aca004c971f0d3cdc343e2a9842fe

  • SSDEEP

    3072:dmk869zNm8/wTwiUk/JhXuJmmFVcqq0GnDZT:d069k0I/JhXuJmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f0fd78780edb7e2e12eab1809ba662e0931f43f99433b7969e92cf81a179960d
    .elf linux x86