General

  • Target

    7f84e07190646c6b497dbb3a0b8996a4

  • Size

    166KB

  • MD5

    7f84e07190646c6b497dbb3a0b8996a4

  • SHA1

    3a92a9457b30f8f409807bce3fcf00ce99f31bae

  • SHA256

    ce6bbbd8ebcf1908ca0af7190b83595658a97bfa29a30b4c17af73626122e3ca

  • SHA512

    15f373d3669337d4bb19398f45c736bb1f72b98a222597adb8c8e5d34c995eae56cdc1edf6781658a62bb7e05f00b61fcad92a8e8e3d6a2fdd4cf3f02d070f88

  • SSDEEP

    3072:NjiW0sOUspyeAwnb7Hwy9D1cK1JvMSVbN+rMMDLoE4gqXaah84:Njip9LAW3QW1b1JvMSVbN+rDLoE4gqXn

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 7f84e07190646c6b497dbb3a0b8996a4
    .elf linux x86