General

  • Target

    35398b5a7662316b74cb5b638bc3e7ebc681b7b2877870980b68e942d125df76

  • Size

    118KB

  • MD5

    f60b9d362b7c28e85b3da47e6f5358d9

  • SHA1

    db1ee42ba75fc425fc48cbe11212a97640e6cc51

  • SHA256

    35398b5a7662316b74cb5b638bc3e7ebc681b7b2877870980b68e942d125df76

  • SHA512

    b41315fc4d5eabae9ddf1fa5c0bf6dda9a43b5954a074dec2da1e6f44b7b4b9a86180a04130d29180b6b898e58efd0854519fbe9eeab60ec88b47d6b670d01ba

  • SSDEEP

    3072:s+c5chhxRv81fAWWOtIetJ8add9QzTsutzFKjt4mKcXeGcgqqK:H1UfBtIetJ8addQ7FKjt4mKcXdcgqqK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 35398b5a7662316b74cb5b638bc3e7ebc681b7b2877870980b68e942d125df76
    .elf linux x86