General

  • Target

    60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf

  • Size

    81KB

  • MD5

    ed57c7caa0f4df1feb20ca08b7c47caa

  • SHA1

    da37a252237a8d8a861976958c60cd00ee0b827a

  • SHA256

    60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf

  • SHA512

    8fabbab2acf35553290e76187518f84194cd7d8b9418a965b6a18d7b15d46c5cd657009e77123d4b7e448ceef12277038a6b56105cb0e689fbebb2a7b5a2466a

  • SSDEEP

    1536:RX11UviuLsJlka7X76sv75xaRef9eg/kp95FKNAw19eoIs6h3skYoafLrGPVu:RX11UqJlka7esv7jaRCh/GsNAw6dskYl

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 60db674e5d647a4c8a581264b9e2ef75767a356f4e359e33fdd13970414a3abf
    .elf linux x86