General

  • Target

    3170c7729ad85754af948b2ecbc2c93aca8d094605867bf186632615ce5e575d

  • Size

    119KB

  • MD5

    d94e7cdb97616e14fb0cb323450fa3fa

  • SHA1

    0095eaa0aa070abbe5fcf0dfbe0aeb4b8cecfbac

  • SHA256

    3170c7729ad85754af948b2ecbc2c93aca8d094605867bf186632615ce5e575d

  • SHA512

    ad890ce1dbea1cf8bcea03999461d24eceb32c589afd5bcf92dd980d575db8ac46ad04fdb378f81592c697850c2640f50c0d7254bb1f4be73f8bc10a1997ec31

  • SSDEEP

    3072:OxaotGLU/5VT4EpvyMmZmgiU7UfeVx8mqoacqKBhnbTT:OxLw+b8Uqv+U7UfeP8mqoacqKBhnbTT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3170c7729ad85754af948b2ecbc2c93aca8d094605867bf186632615ce5e575d
    .elf linux x86