General

  • Target

    315965328e0cf0189d01cefa89d5019fa94dacb7e99acaed5faca4eb442e0ea9

  • Size

    80KB

  • MD5

    d6c2070bc2950fb53d8c93ab29b83292

  • SHA1

    52dfcf3ddc0107f6e9415319a7fc809de9bd99d3

  • SHA256

    315965328e0cf0189d01cefa89d5019fa94dacb7e99acaed5faca4eb442e0ea9

  • SHA512

    fbe3d7f0d7b109631e06520a7f477c85a3975ea1e542fb7dacea5e7649818a5247a9ffad5fa993d26a0aedd232effa46375e3a4b0376e6b1fa7a51a2b70cdd42

  • SSDEEP

    1536:29nhOInUMU1U1UB1zGo5vr5e29swl4FoAo9bRN5mAANeiLZMgOljYbQReR:+n5nUMU1U1UB1N5vrT9sqKov57oeidMU

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 315965328e0cf0189d01cefa89d5019fa94dacb7e99acaed5faca4eb442e0ea9
    .elf linux x86