General

  • Target

    3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe

  • Size

    156KB

  • MD5

    0458b14a8a4d616fbd1be2d2275bf105

  • SHA1

    a84904aa3679e649a8e9006d04ecd527a041fe1c

  • SHA256

    3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe

  • SHA512

    2d518bd9311f2ee47e9098926f36a665d2160c697ef0bfbc66c421f1c0cb8503827360728b0595c7618b4420472437917aa000aacebb593787e95fe30ab1b185

  • SSDEEP

    3072:WBkUlartPjPo9+tu66IsvNvlZGMZCY5T4k/2/PoZ:WBkgkoV66IsFvlZGMZCY5T4k/2/PoZ

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3051ebdb59d883e128e77902c0b7231635b9c6bca49033bb03336934252ee7fe
    .elf linux x86