General

  • Target

    55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8

  • Size

    86KB

  • MD5

    605d37b60ff22b78f5ea4c0547fc42b9

  • SHA1

    44fb41ec25b908bd3ec2118253c50a85e9557af4

  • SHA256

    55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8

  • SHA512

    051da5dc528edd679d118bb5793a90e5c72f63b5ab6c62d622b0879a564158151ccd644da48d9a3c4b01422e054335e0600b3f4028baec022adbda406a434529

  • SSDEEP

    1536:V44wE1Icbs+UzVV13Kp1FDdEloVXlRI1reHAWj5hinq+7she0QzUzJYQ2Wk:VVwjgUpD3K9DdUoBXIte55hiN7Ue0QzR

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 55cf357e2f4e275adb1a3b9bfe46597c0d95655599baa45166ef591b215cecc8
    .elf linux x86