General

  • Target

    31a5fbb997cc045a28abc0abefc17eeac0c94884cc413ef299eb3060d974aa2c

  • Size

    98KB

  • MD5

    6a89636386177b75ce247250742565e2

  • SHA1

    6b0698ed863a940f1161006a31689ce3dcbd70a3

  • SHA256

    31a5fbb997cc045a28abc0abefc17eeac0c94884cc413ef299eb3060d974aa2c

  • SHA512

    acaf1f77d5a36a9a5d2949b22611ac889b4c2356dd7609049db071cc8bac872240c7abbfd954ba42a9be7b092788d4595c121cd4dff8ced3e7e9fd6419b1925f

  • SSDEEP

    3072:83N2HQV7IexMcvzbd5R069nHhCm4KKcXuGggYBK:+yoJP7R7HAm4KKcXNggYBK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 31a5fbb997cc045a28abc0abefc17eeac0c94884cc413ef299eb3060d974aa2c
    .elf linux x86