General

  • Target

    295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c

  • Size

    153KB

  • MD5

    1483e1e62aa6791db6ed372c88d30888

  • SHA1

    624af04cee7728eec4c1495541515db64e94ac1e

  • SHA256

    295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c

  • SHA512

    a950664cfa052aeedb18f6e96af999d1dc8b6ff5925539d1419eb5592c4ac0f6ad9da14b975994e79967c5667af160ade399e059285f12a6cd31d3c42c414af7

  • SSDEEP

    3072:XlEoRSgLyZrVvnNYd+soZS9BFeOlV5BBYfR1c9OXH90PfNatph1:X6oR5+qwS9BFtlhO51ckXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 295a79187770792a578424e77b4a5279bda20d7a1bb5edb4544b8b2fe2c1298c
    .elf linux x86