General

  • Target

    1732ba45ea101cec0360f91ca1ce3492b9fd8158cff19336e69946c30f0f3b79

  • Size

    72KB

  • MD5

    ecbe24efbcd2bb462eed835374efb17b

  • SHA1

    03cbd230dfd5a3a50c829f139a0a68dc13eed080

  • SHA256

    1732ba45ea101cec0360f91ca1ce3492b9fd8158cff19336e69946c30f0f3b79

  • SHA512

    59cdffd61063968afac602701525b30f0c458f0075b41ae93e0bd98e853bbc4ef83e7c8fa75d8fa36ce10123322d34dfb7dd35bac44c9847b7997f8e73b6c930

  • SSDEEP

    1536:b+3AXU+2ULULo0IsHKQBvMEhnLaDk2vTLWzfc9kCGgL3SaUIjPDHIVhyE3GVKbBV:b+QXUVULULXI7QBvMEJLm/bh9TUIjPDA

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 1732ba45ea101cec0360f91ca1ce3492b9fd8158cff19336e69946c30f0f3b79
    .elf linux x86