General

  • Target

    5f9cb6c44bf1093fc2a64d593593d9a2049e1c922b463bd2c2af6cf558c6ddb5

  • Size

    109KB

  • MD5

    112f76824649abcdd3d47c642e564151

  • SHA1

    209c717689cd0d8a096e36c06886252706c057d5

  • SHA256

    5f9cb6c44bf1093fc2a64d593593d9a2049e1c922b463bd2c2af6cf558c6ddb5

  • SHA512

    0ae7ecf107357fd4403b4d8bb276cb0145576ffc5e18080f38fe4df3af4592b43627643fc216ec5d6c00c0800e70fc5929827144750908b6b5798dfae9eb6d79

  • SSDEEP

    3072:7R28FMTv9K6jFDZIcupghunCCqAzZCZemYz7TboaBmST0nYXbg1DE:xkv9K6jFdIcug7ezZUg7TsaBmST0nYX/

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5f9cb6c44bf1093fc2a64d593593d9a2049e1c922b463bd2c2af6cf558c6ddb5
    .elf linux x86