General

  • Target

    c24b21e7be9db14e4913510c5d1e1d22

  • Size

    124KB

  • MD5

    c24b21e7be9db14e4913510c5d1e1d22

  • SHA1

    5270773bc50ec63950e2b80a15d2ef7c741f0bcb

  • SHA256

    eb9d7c5e6f625279fa6d7f9b353bd79917510886e448e1d152d7c8edd93b80ec

  • SHA512

    556b5b6740f7ec871dcf03cc174cb93e3390be54693f2a10954446e9112775b004241bc31157eaa68bb8fd82cd85d3b4cea40131e107886253caaa1b9368619e

  • SSDEEP

    3072:QbqCkOz3UoA0iCHWB+yGe6vfUhcDLoY4giAGaJpP:QbqCVpAj53IvfScDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c24b21e7be9db14e4913510c5d1e1d22
    .elf linux x86