General

  • Target

    yakuza.i586

  • Size

    85KB

  • MD5

    1a8ea5caead1b64c9b066ffb8f959e65

  • SHA1

    f9e03898a2e9c8c3bc45672029019b87ffe9297d

  • SHA256

    21a06e931401f838a8189a7cc6af9026ab62d876d12307d4dbb7aadb8f386e9f

  • SHA512

    9c8eaf72d397a26af1dbdf3ad790062e544b4b19eb10c558a7a8c5a38a0dfd5e0e1686cf21fcb7e16af34d7b0a5057c5b304ca96cacc7ffaa4770b442acdba22

  • SSDEEP

    1536:X4XEAbUgUENUzorrMopIOvXceEQ9E3+MKA3s5hyYF4+7she0QzUzJYQ2Wk:IXTUgVUcvM9OvseE6E31g5hyYN7Ue0Ql

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • yakuza.i586
    .elf linux x86