General

  • Target

    i686

  • Size

    101KB

  • MD5

    3052af4b7dc2e4dfea69b162e14c34b9

  • SHA1

    df3d27a59bee2c8cf0339dba9d731c8c85271f81

  • SHA256

    627143d4765bd3e52364c5882388c64d6c363b95d13b5f73d58a11cbdd67f303

  • SHA512

    dc4916a8016fd56a1016bbc03883d2535ca67f3e0650464d060fbb39574207633147528f420ad17f46fe6a0e72da4be0eada33ba4705b6f84bdfa4633782fc4b

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4f9HmmFVcqq0GnDZT:wJFv4Lm6AJ+4f9HmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • i686
    .elf linux x86