General

  • Target

    5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661

  • Size

    121KB

  • MD5

    bcf7fd2227e7fa6f3b4746f24211ecd8

  • SHA1

    aae58dec3209b070e2d993a58054d9f0d2b76959

  • SHA256

    5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661

  • SHA512

    07783ea389814342b0529d2437a3325343f72ea7282acb293247540a37aa5127ca98f2fd768755ba05842160ba8b276c3d68e48949c37ff2e237e18640a259e1

  • SSDEEP

    3072:iQlA8RXiHU6jPZLyM0XSBImD4qg6TxKmql8chT93a6puM:iQKtRjPFOV2gyEmql8chT93a6puM

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5b02989d715a72f920c9994568e76b3fa37971099feeddf257d2c5380aea0661
    .elf linux x86