General

  • Target

    5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f

  • Size

    80KB

  • MD5

    fd9f29843f2bd9217355efc38bc15c24

  • SHA1

    63826c817af98bcfc33aba2339e52650e599afd5

  • SHA256

    5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f

  • SHA512

    05c2e690d5bf323a7d38ef97f33bf41782ec386a20a24d7ddfad03d18ed598925f8a36a618938b4a7c2806f9614de2630b75c4988261f668b16d48db3e8bb47e

  • SSDEEP

    1536:5tFPivp/+1WAkQuQyzAT0KbkZTjfJIFCgXLZMgOljYbQReR:9ivpxLQlyzAT0hjXgXdMgOlsbQReR

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5d6a5e553925a9b13a84d6fcb616f482741169fe0a397bda14b861af72278f0f
    .elf linux x86