General

  • Target

    d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c

  • Size

    164KB

  • MD5

    a4bc356758ff177aa00bc6de572d006d

  • SHA1

    57f07b0a252a7cd12102a95cde7898dbbfa64fae

  • SHA256

    d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c

  • SHA512

    4acd3c3afa3e0c58d5fc4e8f56971c2f505934685118482dcc0cb2c755cc98e8218cc6032fc4160a67dcdd4c22b17ddbb8327c25f957c7e0f2fe16599c3ffda1

  • SSDEEP

    3072:GNauPcTV89dDjf5nKcETeJLKTd3gPNi/pMetJ8add9QzTsaRT+H93/modtAvfV3C:G/cTi9dDjf5nKckyouUpMetJ8addQl+p

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d9c23aff89eb39eb4f7e637dd2c27d8e76e14684d0ede30b944bc600e84fb78c
    .elf linux x86