General

  • Target

    9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4

  • Size

    148KB

  • MD5

    939542783e9c9d5beacdf175a3790388

  • SHA1

    d8aa7e32fc9603a16bb7d7219363c511fe161071

  • SHA256

    9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4

  • SHA512

    c6d3e4de4b500930856794403f36e67985e2e3e4ed9db39a141a6552b1be0391a23bf2c35292a93fa3249efc72bcd9da5519b18f34867735bc474368cf4f2a9d

  • SSDEEP

    3072:HyZ/lm1dUnle11pZkpJqRnOlVGgPlh7oZpRwWriH90PfNatph1:KeOGECROlNdGiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 9a64fefd3060c1644b8d7f227f408956d0061102297dc64c6bcec4c0919d53e4
    .elf linux x86