General

  • Target

    800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e

  • Size

    109KB

  • MD5

    23c9c691616c252c0e22733de164b1b2

  • SHA1

    cfd8fa12f475abcc7bd77ec9fab61a81139c1c0a

  • SHA256

    800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e

  • SHA512

    06671e2091080155cd26fdbb7914d1f131805006ca1d31fcebe13d6a4085ff3fad90c5a2ced898375d0a16f6585f34c9b5e3a712e757d8e64950408ade20512b

  • SSDEEP

    3072:2D/eX4Q9DCj1E59/tBv8MbzpK9OdbAntHLuOBmST0nYXbg1DE:ia9DCj1e9VB0u6OdKruOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 800dd06c9274936173559b9b3e70c86ba202e2ae3ec44e482db895274be4dd7e
    .elf linux x86