General

  • Target

    3071084b95f8449cc6400354bb303a96bae523bb189b366a0111dabd8ab3bddf

  • Size

    75KB

  • MD5

    45a0b9312d2e1709841fc51d6899945c

  • SHA1

    993976c383815706976186237854cdb7d9c868b8

  • SHA256

    3071084b95f8449cc6400354bb303a96bae523bb189b366a0111dabd8ab3bddf

  • SHA512

    a64298253eee1e457c4320187a71226b7563e2ca21b511a9393258346604f85ba59d0dd3bb18fc6354a41931b723cff18a4ef27bcc21543ab27f646f89463e73

  • SSDEEP

    1536:slQydTzoEWNcgM5KtljSO5SvTEfcC52jLDwIJhyE3GVKbZV:srdTzyagM5KtljJ5S4fcC56LDzJhyEWy

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3071084b95f8449cc6400354bb303a96bae523bb189b366a0111dabd8ab3bddf
    .elf linux x86