General

  • Target

    ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11

  • Size

    93KB

  • MD5

    d1f2ba561ca8ab9bdb53f9b3f63a5e91

  • SHA1

    c05588bb2345199a6216c606f40ce9ed514fd7de

  • SHA256

    ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11

  • SHA512

    c47f789bbf7faeca56092201e15dd36c1179ec2d27c4773265c07db8c91ada67774dce0ff1c46336a672f0fd4b562f17a3f39b24d15d678eb32844ee05b74e3c

  • SSDEEP

    1536:2Swafh5cfDj5lLWybWGKt/QFPYv/KDU7OclmmEequN4cGb1Mh7yMLN2UcYV:o85cbj5BWfjt41sCDUrgmDD7GbSh7yMj

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ae006f289dcc2e9f43a651424225320d5e9d950e605a3d0c4b85306316ca5d11
    .elf linux x86