General

  • Target

    yakuza.x32

  • Size

    89KB

  • MD5

    51e7f2f04c25421181adb2745d690bdf

  • SHA1

    f6753c2c5b6673501196591679f88be3dca23c97

  • SHA256

    8892440dc696bc9652687e208eb98c5c57044b5788763b82e2fadca7a6806825

  • SHA512

    084c281f4d05e79472d585f1afbf9740e9d593b8b25d62572fc3e4a2c14d77bcafeef3b2b73ebfd8065b468e0d57068c9b45c22a0e693b740551afea13bfa786

  • SSDEEP

    1536:2TEao37JOl3Y9SpgwKWwCwyIZWDq1S3u8S5hBK4JseWshe0QzUzJYQ2Wk:MoAl3YEpjdwyIZWDq1jB5hB7WUe0QzUy

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • yakuza.x32
    .elf linux x86