General

  • Target

    c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738

  • Size

    98KB

  • MD5

    f134dc96caad1bff2814144cda978fe5

  • SHA1

    3635eb50b858d7b5fa92bf2c9020b6d01a008df9

  • SHA256

    c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738

  • SHA512

    a20543d7a918caa5922e0bc07e786b14f2579d82cdcc00f64e3a112db46dcbd78a8c2c59acecd0726b60a76f78c7a08e7ff936c4ae25fb13aa7f18b51fa12abf

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqJ3F1QmqoVcqq6GnQOT:heZyo5KqJ3PQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c1d8a9e79dae8ad5cc52482c0c7049eed0ddef73411de4bf72b4b208c2320738
    .elf linux x86