General

  • Target

    34dbf27cf6c4a81544e4385d467eb49d89612c24e89299e8967b88382e635a44

  • Size

    97KB

  • MD5

    2501ec9a3d42f9c067f51dda2384beef

  • SHA1

    1675f883ed01df1eec77df7c200bad0de3ebeb3c

  • SHA256

    34dbf27cf6c4a81544e4385d467eb49d89612c24e89299e8967b88382e635a44

  • SHA512

    6fc8ed3d99ffeb8892918f2c3d021843fa1915eef3b614755fbee9d5a3d4255a2f88d86944798f15810a8b884d75f53e9d610629859fd02b22cd438d2a91b8d1

  • SSDEEP

    1536:+wV5APCmefaFSwXWa6dEc0QEfDo185uV+qyOrQB6TmmiIVcqqzIGnOZT:5AameJHd30QEfDo62TTmmFVcqq0GnOZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 34dbf27cf6c4a81544e4385d467eb49d89612c24e89299e8967b88382e635a44
    .elf linux x86