General

  • Target

    32daa77977987e91a87cb6a0a37513bf

  • Size

    97KB

  • MD5

    32daa77977987e91a87cb6a0a37513bf

  • SHA1

    cc025b44b065ca4faca30dce2034d0427e0f3437

  • SHA256

    6450a27b5fa41e0568f2eb0a84b54dd71112c1407eb5a4446058780fceee1b98

  • SHA512

    e842d8290a0ae0f271399b99b62271907bcfce0343fa76fc1b3367f00668fe1399ddac524cddabae0b6e7930ba437d4f4402788070219da95339ad90d02f4983

  • SSDEEP

    3072:gjtwgA6UlYzZveohR9kIE4fdGZmmFVcqq0G27ZT:gjhzt3mIE4fAmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 32daa77977987e91a87cb6a0a37513bf
    .elf linux x86