General

  • Target

    ceeb250e15861e234f084e6067fb80c51d0a131a5480484462e331809a123ab8

  • Size

    101KB

  • MD5

    6f5313ef35fe54e9bcde7e6ef4f33c96

  • SHA1

    37984a55061dbcce2fcd557770942906e000e1df

  • SHA256

    ceeb250e15861e234f084e6067fb80c51d0a131a5480484462e331809a123ab8

  • SHA512

    baf174e05efc9eae026b7a3df1bbc5a491f325173ab133d408c3bf6d5c3f53255b260224d4c87ce27a1c8758db5094a338ee2f4df53dbfedfbe91db9b869172b

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fqHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fqHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ceeb250e15861e234f084e6067fb80c51d0a131a5480484462e331809a123ab8
    .elf linux x86