General

  • Target

    32bc32afa65663a8bf40aad9ea6b9bab7f9465686351773cb320460162f0a8a2

  • Size

    93KB

  • MD5

    db142eea1844d348c4cf5f386b3abaea

  • SHA1

    180b01c5361c397632b1602ae00f127d0ab1b55c

  • SHA256

    32bc32afa65663a8bf40aad9ea6b9bab7f9465686351773cb320460162f0a8a2

  • SHA512

    1d86575d71eaf0403926c6fa3ec05cb1ebf97969110f241d0caa30608d1067208d064dc3b1f0775fdf7ded04e7451623d53113acaa250ea8f10d72f0639b4067

  • SSDEEP

    1536:+u3p2xcVFUBZhH3t3aKqPzZUMedjoCKFa3h1aviIaUxommiIfcqqzIGnOdT:+u52GFUBZhHxqP1UpdjoC8fsmmFfcqqq

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 32bc32afa65663a8bf40aad9ea6b9bab7f9465686351773cb320460162f0a8a2
    .elf linux x86