General

  • Target

    349eff8ebddb8e19b728f7bb88557bfbbbe977fef0e521cc4907287c5c723d37

  • Size

    109KB

  • MD5

    edaf147041f2f6b9010d7dc648845fda

  • SHA1

    d2facbade5f34f6d0b927b859ed077e08c247a1a

  • SHA256

    349eff8ebddb8e19b728f7bb88557bfbbbe977fef0e521cc4907287c5c723d37

  • SHA512

    22de14f79f68fd12293832606a9efb87ddb0c9f91b5c5aa53bdea95b1ba65aabe82021b83a2247d56a493301227a316bc4f891aff60fd1221306ba55bc243b1b

  • SSDEEP

    3072:2h/k3w9DCj145FtNgvXMbTpK9u9e0ANWruOBmST0nYXbg1DE:ch9DCj1qFfgvO6u9IuuOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 349eff8ebddb8e19b728f7bb88557bfbbbe977fef0e521cc4907287c5c723d37
    .elf linux x86