General

  • Target

    5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44

  • Size

    98KB

  • MD5

    d9a5ff21d32f921ff262ff5de440e42d

  • SHA1

    1ada64602e1ebf4916a72a2024b6356522f315ac

  • SHA256

    5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44

  • SHA512

    f3918c73edc65cc0db05b8b6a5e34a0b05650abd16bd23a259ee031170fa9362c73bf80ad7d2d51619a6a84660f15ab5c8a8c12a5421f73dc222ab8e109ae060

  • SSDEEP

    3072:kZ5SLib+EMdfNUaIqGcRezMUi1Xg4NKcXUGcgf2K:kxy+3qGec4g4NKcX3cgf2K

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5d28d58d0b1767518097622bba18c42dabbc8113e171dcf77d055d721e62fb44
    .elf linux x86