General

  • Target

    5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e

  • Size

    130KB

  • MD5

    c1c745edac20588e198329f93caaae35

  • SHA1

    f67b4d6a9c3042c1f124e5364f97d1319b6c644d

  • SHA256

    5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e

  • SHA512

    75bde70b0db625117ef74618282ffa1142e839467316b1a8262edf17172dac81f46499a2764296aee8fd44b8b2928e72d198b5417d955c92996bf36744add96b

  • SSDEEP

    3072:Mb3c3l+KQnWUXCBYAk4BvTdnU+ZBley/Z47jIermq0ichYyeaK0FU:Mbs33O0lRrmq7/Z47Mermq0ichYyeaKD

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5bdbf23d02263a4967870499d2acc1bff89060be091d7ea41f7756fcc6a0407e
    .elf linux x86