General

  • Target

    31b895f7171860e4565629565788c84a71b23a6afe1ab757c2248cfdb258f541

  • Size

    142KB

  • MD5

    508efc2424991f3cd056f2985a6626f7

  • SHA1

    5036c4b77c9ab980c2752bd6dff29ce631844e50

  • SHA256

    31b895f7171860e4565629565788c84a71b23a6afe1ab757c2248cfdb258f541

  • SHA512

    7e6302e17a65cab69f2bc12482baa1c9524538363c4e10769e4611737cea35c09a435db7461a5d0a153cb26107601151caca526ce2f8ae9acc5ac7de2a473611

  • SSDEEP

    3072:f54IE+MLwXUbuiITCAly595CB7koomIDB0K4gQv+atWM:f54IE86lWns92koeDB0K4gQv+atWM

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 31b895f7171860e4565629565788c84a71b23a6afe1ab757c2248cfdb258f541
    .elf linux x86