General

  • Target

    8242fb4cb0dff5240c9d6ca2bc73af12.elf

  • Size

    97KB

  • MD5

    8242fb4cb0dff5240c9d6ca2bc73af12

  • SHA1

    a69e3924e5662ef3d863827a21f661f183629a42

  • SHA256

    4a00076e40d4946274bbb7d25dcbe5fdf0da3ff23980adb7392b19f7a47e7bf7

  • SHA512

    b1febc030dd1f8f2694cb12556937426cd771c5e583ca1af266b46f50d89c334045acbfc78debadba641b7e877349c9f24bd2cdc6132af66f97dfb06eaa2cf8f

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogTEmmFVcqq0GnDZT:VK7DDeKlogTEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 8242fb4cb0dff5240c9d6ca2bc73af12.elf
    .elf linux x86