General

  • Target

    3015c38d8895380656a8fe3650a6bb23d88c2d6ff98628cafbd7096d0151547f

  • Size

    92KB

  • MD5

    20cd5f46aab6cac5250bf2a854429d80

  • SHA1

    214c5324661103f62f8ad2cd0b7d6dcb6c462b12

  • SHA256

    3015c38d8895380656a8fe3650a6bb23d88c2d6ff98628cafbd7096d0151547f

  • SHA512

    a9d79861659c6ae9d351afa7f432857e4f1289d5a5e6ef82532928d3e9c717c59c962412ec71c5f0237a208cf85018d2c48aac568e6a87121c6448eaaf77bef3

  • SSDEEP

    1536:0yXDP3ZhUNUPXPKmYQaC/Qdk5cc/z4d7J2cNU5mZ5hmd7w882PM37K8PN2UrYe:vXj7UNUPX5YQJQdScc7M7JFp5hmBw88F

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3015c38d8895380656a8fe3650a6bb23d88c2d6ff98628cafbd7096d0151547f
    .elf linux x86