General

  • Target

    22c42ea3472c3dc0ff9330f5cd601d87f6baa254a845416ba1988f0916423c12

  • Size

    97KB

  • MD5

    f52cbc1ea18d14dba2ffebee32eb69e0

  • SHA1

    8adbb9b37877b15083bc80a3f33cd07f236bac64

  • SHA256

    22c42ea3472c3dc0ff9330f5cd601d87f6baa254a845416ba1988f0916423c12

  • SHA512

    aafa53e73b5b818edb8a6138652c4626746755b5b1e67a6984462c4a1381f8d1ca2482a79870b44f5f64d89d96522c0e25206f1204e1d423bc8c33b02dd6671f

  • SSDEEP

    3072:CQGwddUWUh917j8ww71/iPtb9AURyPfB5hnG6g6inf0OziyoQQuy:9dRu917j8ww7EPA5P55hGcinf0Oziyol

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 22c42ea3472c3dc0ff9330f5cd601d87f6baa254a845416ba1988f0916423c12
    .elf linux x86