General

  • Target

    5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14

  • Size

    89KB

  • MD5

    837673db15e6b414e8c7d038ab1712d5

  • SHA1

    b1d6fb9600f5af1e950f267b992b33c1181182d3

  • SHA256

    5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14

  • SHA512

    0d38768fef02d05da8ab732f15ea39a9d9cd8cdb910c51559cbd181e63e2499001253cec5f78da8f19e9a740625f2f744842438ea91da513f39277c09f134e98

  • SSDEEP

    1536:y9zE4IEtvP8mko3UzOegB2i89+FDfbh8YShPL8fTA6Qm5hCh+llLTgKkG7she0Ql:8pIQU8Ux02R9kDfbaYwPL49R5hC2H/7N

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5b652fdbe7b68357900833f44e4c32ee009fb61ebce508b0cf6dc99958d42a14
    .elf linux x86