General

  • Target

    2da3bb03fa78b57c93b197c3869d3ae759850edabbb38c3262ac74c33a922ef5

  • Size

    109KB

  • MD5

    c934bc13933352c0e22144d202752138

  • SHA1

    0508f49dfcdeba1282d079d643836ab2a9221c05

  • SHA256

    2da3bb03fa78b57c93b197c3869d3ae759850edabbb38c3262ac74c33a922ef5

  • SHA512

    40bcebc37aaab1aceb36854b0c51bcc40c2c32c4e66d751934aa5093b263b0db9a57fccaa90cd7319fb7cdce26b83fb699a3dfd8bfb7f9ad99d05ab9508754cf

  • SSDEEP

    3072:2D/eX4Q9DCj1E59/tBv8MbzpK9OdIAntTLuOBmST0nYXbg1DE:ia9DCj1e9VB0u6Od9fuOBmST0nYXbg1g

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 2da3bb03fa78b57c93b197c3869d3ae759850edabbb38c3262ac74c33a922ef5
    .elf linux x86