General

  • Target

    7d234c58118218fd6caa52ac4f619bc519399c1a2454898de861af7a38dd54ec

  • Size

    97KB

  • MD5

    2a4235a40b86b7d03236077bbc5daefe

  • SHA1

    6b2757ecd23439e2cd59238df795ca2bc1dfdbf4

  • SHA256

    7d234c58118218fd6caa52ac4f619bc519399c1a2454898de861af7a38dd54ec

  • SHA512

    4df61061adc7020762fa9f4fcaccc676c55ff59b194c8e38716898240c7306717d0cfdecd7efde74800150444f4b449c8dbfc2888c0b9034af0b70397959769f

  • SSDEEP

    3072:IGuz180UBruHP4Pj27Mpkd39loGFmmFVcqq0GnDZT:IGArUr4AChdNl7mmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 7d234c58118218fd6caa52ac4f619bc519399c1a2454898de861af7a38dd54ec
    .elf linux x86