General

  • Target

    618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb

  • Size

    148KB

  • MD5

    1bfce428a79f3ebd38b3077641024325

  • SHA1

    1e6bc8b5013c2432dffd403b31f5ed9111240f0f

  • SHA256

    618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb

  • SHA512

    f5f29b28a3799877100569df3a7655fd4cc67f8f083c404ea6697ddf94f253bd599704f0c7c124fed091968912eb916cbf56b1eec49346a2a0fdb7595cf16205

  • SSDEEP

    3072:HW5f5GpNUTle11pZkpJqR6OlVGZPlhcnTpRwWriH90PfNatph1:meaGECRplEdGnViH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 618ed5c07ab66408af31110fb0caa92ff745c4c37e81d89f2a0bf6445668b5bb
    .elf linux x86