General

  • Target

    9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3

  • Size

    103KB

  • MD5

    55ad7db4c404fecc43dcd47ad7b7c4ae

  • SHA1

    a7fed7aa54ed383b02dae750f7ea236c0de9a0ae

  • SHA256

    9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3

  • SHA512

    a004e1af9aa579dcf08957c5d382e2ed8c4ea6cdc47eb3fe9efac16ac389053b7301cb8d6591ad7d55657870e7966dccdafc417be420b9bb95437b1089705533

  • SSDEEP

    3072:ILJUlZBy1ps8zvk61yA1QqJmUrF2Dx8AIY/AhvjE:IL6lepsUn1BJmUp2Dx8AIY/AhvjE

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9ed273a479e390693291dba0500283adb258951b24ab51dfed51d4f8a0b36ff3
    .elf linux x86