General

  • Target

    d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4

  • Size

    112KB

  • MD5

    57891b3aafeb9866690afc5280a2d826

  • SHA1

    d96f82df8e4b81a608a3c6e268a774ce5d145bff

  • SHA256

    d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4

  • SHA512

    6eb0d550e462f45adead26dee49257ce56640272b05f098538dd1458796155d399c7c61ca02464ae925f9e5c36d107cf5a47081adff6fca9bff4b7eb95f9dd0a

  • SSDEEP

    3072:qIZG2RxU0U1ROSkJJrKvNRObn2aHhD90xDYzjmoTadjfn:qIBVuRzkJEFSbHhDOxDYzjmoTadjfn

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d5914d041b6db9027c35999a66ab4c0dc17a066fb114405400b49a8a6997b2b4
    .elf linux x86