General

  • Target

    33decf74c71af76b02c301c0369fdca72244d3d58d74b5a5b775a621b8bbf44d

  • Size

    89KB

  • MD5

    db24f68d18412867db6530127d998a81

  • SHA1

    3e71882c806f2c41c725fc220c8e501d3bcac0f2

  • SHA256

    33decf74c71af76b02c301c0369fdca72244d3d58d74b5a5b775a621b8bbf44d

  • SHA512

    55d00e047d3b30274c82257f87fefda0779c828231095a74ba46f55b472291133fcd31dbedff3d32553d13d9c8640bd6d156fbea75dd6c4748cb48b595b01124

  • SSDEEP

    1536:2bcSA3zJO93RceGQwqWQC1yIZ2DN1d3Oot5hBayrJs6Wshe0QzUzJYQ2Wk:kAI93RceGT91yIZ2DN1Qm5hBaqWUe0Ql

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 33decf74c71af76b02c301c0369fdca72244d3d58d74b5a5b775a621b8bbf44d
    .elf linux x86