General

  • Target

    336ad35c78817ef0f8d89c3daadd6d8105447c69b4bd2d27a8144cdccf7a4772

  • Size

    153KB

  • MD5

    bdd5725299e24e00e6fd9b9d237c4c15

  • SHA1

    251d3cd612bb414826727ab24afa2fa9ff315477

  • SHA256

    336ad35c78817ef0f8d89c3daadd6d8105447c69b4bd2d27a8144cdccf7a4772

  • SHA512

    1cee3402c2460b5ed2df55b9195267d2e9ceac98d4978c24ef492cc8a8ab954ed11e5e106fa53cdd5011ea2995f01d1d8b51f6db7fbefc12450f7e0f2d1eb8b0

  • SSDEEP

    3072:tT9q05nNrQX1qNpd+Me7wCUhhOlV51AwHbxhY/XH90PfNatph1:tBq0TNe0CUhYlVAwHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 336ad35c78817ef0f8d89c3daadd6d8105447c69b4bd2d27a8144cdccf7a4772
    .elf linux x86