General

  • Target

    f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe

  • Size

    91KB

  • MD5

    c2bb469356bda78e407ce12a4987c7ed

  • SHA1

    88e73d986d4b0b19789e4fe7c4a317b0ced9e6f2

  • SHA256

    f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe

  • SHA512

    7ebd579dc1f83c9e7c92ac669b45b092cfb4a50bb67b125f22b27b0921bb78393c1475247cf8f50147fecf9842c0292359525f6d6d1243fa99475df61a0b3678

  • SSDEEP

    1536:h9O91OMJIUeUN3NCa0LUCWG3CeQoQcr9lh3aNXoc01WE7DUgl/hR/6S2F21Mh7yw:h9HMGUeUNEa0LaG3jQoQsDh348oE7DUd

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f71969740bbe38b1788782ddf0f41a942032f82d62feb4b8a9994cd7f6e371fe
    .elf linux x86