General

  • Target

    5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf

  • Size

    124KB

  • MD5

    7351114ec11aeca42464ab033a0c957e

  • SHA1

    c69b964a307a1a110cd8559912e8a00093cc7034

  • SHA256

    5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf

  • SHA512

    be6170de8ec65c546d9085f559fc9df54eae11f481b3f8154e28ce88e7dda4b20650146179d198e8fc8f1cd855546f2d364d3b666b2d49be3ceaec60850f5414

  • SSDEEP

    3072:QbqCkOz3UoA0iG3WB+yGe6vhEhcDLoY4giAGaJpP:QbqCVpAjN3IvhCcDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5b083b1ec2e4bf049633bd64b3e856a8baac43e79c099c7034ad5d6f03dae6cf
    .elf linux x86