General

  • Target

    b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6

  • Size

    120KB

  • MD5

    570692cd2af833f37b00a64f460b71d1

  • SHA1

    eb59099890ad2b1c8708f7bdccd0c194dfc24f24

  • SHA256

    b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6

  • SHA512

    0cd6d1760241adc352bcf18f647bc37e0188cdfd792bc2470d05053152a8f978aeab97da9c49c62894052c9c65d504b29e2b88d0705391197efd5e82b65c2eca

  • SSDEEP

    3072:nZTGMoRInSP7Uo1polSI2682xuQyuLng/PD9oY4giAGaJpP:nB2RS+k2exhyuk/PD9oY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b019a65d9059a3df90d49601d0667fc9424d34824021f545f678ae98b5d6bbf6
    .elf linux x86