General

  • Target

    f94e276fce39ed8b68b08031b80214cb.elf

  • Size

    97KB

  • MD5

    f94e276fce39ed8b68b08031b80214cb

  • SHA1

    98ea503276f07e723b3df6dc57de3190213df7ae

  • SHA256

    bf74f02d83beeae65260586e6c6a1ab88b4afae0b506529c25b71406da0e9b66

  • SHA512

    a5d50a077a95b678eba371e2a0e5bb938630ffc2ed2d574959b85f4a42af0a075bc17540f44421cbaec8e693badb9acd0afb03eddf227e4daebff20e06f4e784

  • SSDEEP

    3072:Jg4eodUWUh917j8mc2deiPUDAZURyPf55hQTSvxinf0OzTyoQQub:JdRu917j8mc2H5Z5PB5h8cxinf0OzTyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f94e276fce39ed8b68b08031b80214cb.elf
    .elf linux x86