General

  • Target

    i586

  • Size

    97KB

  • MD5

    a22f4c52d1458b68c7d6719122477533

  • SHA1

    349d9cbd3d8f5f2387e9f5c9f3361438ff4ce499

  • SHA256

    32520714c17f60b33fa7579d278864db0f3f4508daf5a64afa5b12a20ee5ee6b

  • SHA512

    10d8082a4d2a21e516b8f9f7ad26e20600d6919a4898dfbfe558be26de871d4b9de3709ed6974e21839b0cc9064eee2cea56f41ba9a4dc8d22cd6b67a7bd2865

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogVEmmFVcqq0GnDZT:VK7DDeKlogVEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • i586
    .elf linux x86