General

  • Target

    dbee7283d2fb15c9228761faa489768e24f530f57e39c0a7ae6b785aa55e64f1

  • Size

    148KB

  • MD5

    3b45f1a7f8ecfc2d21b99650955c4f67

  • SHA1

    9c41ad2e82a74426aca8ef802921b098a0ee128d

  • SHA256

    dbee7283d2fb15c9228761faa489768e24f530f57e39c0a7ae6b785aa55e64f1

  • SHA512

    c653cc7905a1bf670ba6f1adde4c4d619bda17257dcd2317cd65c27b9233f9f023342881e10b9d522cf76b9f8c75ec7f77a797b9d0f0e6b38ad618a934eb8e94

  • SSDEEP

    3072:HyZ/lm1dUnle11pZkpJqRjOlVGgPlh7oZpRwWriH90PfNatph1:KeOGECRKlNdGiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dbee7283d2fb15c9228761faa489768e24f530f57e39c0a7ae6b785aa55e64f1
    .elf linux x86