General

  • Target

    312b9b3bbc3dc19245d8382d09bb3cb7c15df975578b21351413f9a483f7b653

  • Size

    92KB

  • MD5

    f57c4f3c02d573912190c6da6660c397

  • SHA1

    3b17decb020d008c958245a0ad170def8ccf342e

  • SHA256

    312b9b3bbc3dc19245d8382d09bb3cb7c15df975578b21351413f9a483f7b653

  • SHA512

    0f856ff7267c91f571f0ffd97908a8c959fedc6f8850cf1a106deef1838509644aa0f8c39563d14b5fb1657499d6d169824cdc82c6cf16e3758dfcd855b6c8ac

  • SSDEEP

    1536:0yXDP3ZhUNUPXPKmYQaC/Qdk5cc/z4d7J2cNU5mZ5hzo7w882PM37K8PN2UrYe:vXj7UNUPX5YQJQdScc7M7JFp5hz4w88F

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 312b9b3bbc3dc19245d8382d09bb3cb7c15df975578b21351413f9a483f7b653
    .elf linux x86