General

  • Target

    325f353c663b0483828635033d648cac88df0dea0db8b3aa86f76fea695b9fef

  • Size

    111KB

  • MD5

    22b1372661428f95c07ff494d5d64d85

  • SHA1

    f8ed7697caf568769065eb8891038c75866bf76c

  • SHA256

    325f353c663b0483828635033d648cac88df0dea0db8b3aa86f76fea695b9fef

  • SHA512

    7294f3ca7766779b759c06404ca2a2e5802461bda061b2fcac1e1a84ff4da2f8c0d1e0a523a9a9f3ada701eb22921ea1965e399d4643d1967d3f3f601620c5a8

  • SSDEEP

    3072:8jKiyRog2GWTOtJEr/FLgmqK1cLHknnUTW:8ulRbbQr/FkmqK1cLHknnUTW

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 325f353c663b0483828635033d648cac88df0dea0db8b3aa86f76fea695b9fef
    .elf linux x86