General

  • Target

    2ee17b710250cbe10f222bd0262e66ec

  • Size

    97KB

  • MD5

    2ee17b710250cbe10f222bd0262e66ec

  • SHA1

    a093a369b8c9da9693c67c4f048b7104577da58c

  • SHA256

    619c8cc2d40d05860d4aa550516cd26e6608d64c9c782b9a1d326129b2b2d611

  • SHA512

    58c948797793474914d25dada490d0fc14f5cacb854542e847636abf03f920fad5e83d0c2564a8f186c54166b5811d302fe72be91c703a561e684ff7fe4792f7

  • SSDEEP

    3072:dUICodUWUh917j8mc2deiPUDAZURyPfv5hVTFvxinf0OzTyoQQub:tdRu917j8mc2H5Z5PX5h1pxinf0OzTyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2ee17b710250cbe10f222bd0262e66ec
    .elf linux x86