General

  • Target

    8e8857e0e65e9c1e53f42e315bfa6f7d6cf5749e962725880d88732b9c887d25

  • Size

    79KB

  • MD5

    0a3c4c28130303cf00aa14146b30f859

  • SHA1

    ca4ca14eb06a7b48e73fbeebbe3a82e948cb8e63

  • SHA256

    8e8857e0e65e9c1e53f42e315bfa6f7d6cf5749e962725880d88732b9c887d25

  • SHA512

    218cc17aab58c433b3f87b7d673a77e4a20b7c92e4a4b994970dcc652b1737a8d4969349a212137c9867a8e69759e40adc051812a675568544a752fa7d85086e

  • SSDEEP

    1536:pBN3sy0b3TpWqMigKlmwRA7yVD5Qv6anOjH7e2ms7D0OzTPzxf3Xk:h3sy0ncdig2p+70G6anOHFmiD0OzTLxM

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8e8857e0e65e9c1e53f42e315bfa6f7d6cf5749e962725880d88732b9c887d25
    .elf linux x86