General

  • Target

    31d37c6bec41569c4af84e667e5cb6930f7de456f3794ff80746e79c92c97bc6

  • Size

    148KB

  • MD5

    f99f49f391461c6dd1252de6c26a3c6e

  • SHA1

    76104a2d3eb99f4a2eee2e7578e5eda9a19a07ce

  • SHA256

    31d37c6bec41569c4af84e667e5cb6930f7de456f3794ff80746e79c92c97bc6

  • SHA512

    8c0d6d080026f60a02b5035340146e0d5e71836214b49a9de7f0034f9efd068a6c8f157e98d4039ba5b6b346b4334ecac5aef0d41c8a4112ec88d8a6aa7ff1bd

  • SSDEEP

    3072:HuJc+Ga9UtxUVVpSE8JqMQOlVGXalhapRwWriH90PfNatph1:ZcQEx9MHl2ewiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 31d37c6bec41569c4af84e667e5cb6930f7de456f3794ff80746e79c92c97bc6
    .elf linux x86