General

  • Target

    e42868c2df453adbcd43464f957e85dde1ba71897c2c2b91f7671e1e615f118a

  • Size

    111KB

  • MD5

    715d3b27aa7b20afb04da5b35d390bfa

  • SHA1

    1c07d9b8a71bffe74904aa0b1268c6ccf3d56d56

  • SHA256

    e42868c2df453adbcd43464f957e85dde1ba71897c2c2b91f7671e1e615f118a

  • SHA512

    739e128a8ca3790f24cd610351b5fddfa4b1b4c66221385a6b89fb9bbe60a93a500e0a29c49eb0b0a719a4a306daec082bce930b87739a3b608bba7931b0089a

  • SSDEEP

    3072:AQkI+QUBC95JiW7LvL2JhMWuefYvpEdmqKkcLJSYnLj9:AQ995s+CIIYvCmqKkcLJSYnLj9

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e42868c2df453adbcd43464f957e85dde1ba71897c2c2b91f7671e1e615f118a
    .elf linux x86