General

  • Target

    87d14a1bc8b25d7d57f9143dd577d32e

  • Size

    109KB

  • MD5

    87d14a1bc8b25d7d57f9143dd577d32e

  • SHA1

    47cf189eb76a72a9f369f6e498f29b79d0c59f9c

  • SHA256

    17357f022255ac5a1a3043e0779cb14ece3012a7e6f2d8efda119380dde172b8

  • SHA512

    fc4e513bc90a5e1966ce7969d61ad2a3d71e9ef4abbcf6403bd417afcba1390215602539c2fbd0bb80f8aee19fce0860f8d3dc09c4f78ad1795e64c93aa4f2b1

  • SSDEEP

    3072:2G/PXUw9DCj1e5dLNgvXMbTpK9u9TuntmruOBmST0nYXbg1DE:/h9DCj1wdZgvO6u9Q+uOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 87d14a1bc8b25d7d57f9143dd577d32e
    .elf linux x86