General

  • Target

    768212f956e69025d68d3afd745f8a023042446e4d66303fcc179f141d48f0db

  • Size

    80KB

  • MD5

    2327b1170db8f3e608641153fdd12b6b

  • SHA1

    f77840e11fd1302bc5d9406aee1373296b9919bb

  • SHA256

    768212f956e69025d68d3afd745f8a023042446e4d66303fcc179f141d48f0db

  • SHA512

    0bfcc41071b303d5e370eb8ae3ae7525008462f7ca8067f71994ecb71bd8006cd6d97687c3404294f9c2d214043af2ae7f18f87eb80cf72d58e4703231bd4764

  • SSDEEP

    1536:lw8V90Hp7hJYS+XW4MvjcIIZCs+VhXOwCIi/UYYFQ3y+GwtXs310OzTPC+jWUk:lBaHp7hJYfmLvjcIIZCPtOn/JjtXm10L

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 768212f956e69025d68d3afd745f8a023042446e4d66303fcc179f141d48f0db
    .elf linux x86