General

  • Target

    c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a

  • Size

    80KB

  • MD5

    fff5fb6be4d1622ea244a9478e595ad1

  • SHA1

    4aaef5dcf15b896b0c88499767406e026b9211a1

  • SHA256

    c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a

  • SHA512

    a308e70254670c5f02923fdc6a8785fa2993bff994f3c0e6c4c03c6183527772adc6342fc05e348907510baa0f589fd999ad18a54772fde2274e1e76a1e4060b

  • SSDEEP

    1536:29nhOInUMU1U1UB1zGo5vr5e29swl4FoAo9bRN5mAANeiLZMgOljYbQReR:+n5nUMU1U1UB1N5vrT9sqKov53oeidMU

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c2644f6fb5d2125cfc6d0d7f6bc5d57056e494ccbee9f78272f39a1194fdf75a
    .elf linux x86