General

  • Target

    31bb9961b67c8151e22bb749b39aa5667abcf98a6193c8fb1bce0e1173d23e91

  • Size

    115KB

  • MD5

    90d1e9f4f4703870c9ba4836a3420188

  • SHA1

    ec42210e0ab77ab795041deeb6dc23060bbda573

  • SHA256

    31bb9961b67c8151e22bb749b39aa5667abcf98a6193c8fb1bce0e1173d23e91

  • SHA512

    0188d4b3842a8aac616bb11fba563a870b1a0e182847cbfe6e909d00a8a3527281bcb35e0df2089e9706afe0622220df1d522318b52e37124b22cc47aab85284

  • SSDEEP

    3072:Bm1eslRUrU5UrU+UGtqi6zDoTbRb7FpEX+Pnbn5hadLQfGYcrQlfKJ+ZtO6QLdv:k1NKGkJvqtDonN5nbn5hadOGVrQlfKJJ

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 31bb9961b67c8151e22bb749b39aa5667abcf98a6193c8fb1bce0e1173d23e91
    .elf linux x86