General

  • Target

    312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9

  • Size

    87KB

  • MD5

    9c8a503da274aae5ee04aab2e50a99dc

  • SHA1

    9252e0b85193d95a2716eee18aadabe3f32195d0

  • SHA256

    312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9

  • SHA512

    3b1da50e3a9ab5ebf867672e55186fe236af82b4cb93ca12910f0b1a7ef756cf754e6af3e76b4658f3d60a2c9dd62956f789b4dd629842b370e429f2902a4542

  • SSDEEP

    1536:H+oIR8RXii8yXml89Tvnfhd0hsQTkJluFbwHL5SPsLOnPGJUkft3LR52wm:H+4RfWWdvnJdapAJowr5csLOnOJUkfxq

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 312f9497a6839b44a89215b49315417a4bc7388d817f4cd956975d2dc78372f9
    .elf linux x86