General

  • Target

    3137e0f46f836b200585389e774791986433fafde645b4c2c8d58b424084ce29

  • Size

    103KB

  • MD5

    91fcd69c7aa218b9303f5f99959b6d28

  • SHA1

    18489c05922d4955c82b364225d940792950461d

  • SHA256

    3137e0f46f836b200585389e774791986433fafde645b4c2c8d58b424084ce29

  • SHA512

    b6bf104dcd6508fab2cadf21688cbff2323aac3154afe3aa9b3395ded23707edfb20c82364753dbcd6b138209cb7bc348292bb1050cd61db6222bda04da313d0

  • SSDEEP

    3072:pHMSnut2OewKVneH7ZW5/PDx8AIY/AhvjE:pHLTdny7ZWBDx8AIY/AhvjE

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3137e0f46f836b200585389e774791986433fafde645b4c2c8d58b424084ce29
    .elf linux x86