General

  • Target

    57e927a44b5c3dbe34e584c47c703c561e64cac16d918b1ab1d1a66c592a7c3c

  • Size

    97KB

  • MD5

    15dc2a138deec14d7c74011e80a9f7ca

  • SHA1

    cd00258e215b9c2c061b5ba922bfe883ff9c7b68

  • SHA256

    57e927a44b5c3dbe34e584c47c703c561e64cac16d918b1ab1d1a66c592a7c3c

  • SHA512

    9b7122115fd5b77543c0423d9f116173ac81467f00a6da080e80dd8491c1f01135c0549fb25055b7b0a328266dbc6fc3393113eee147a097a1efd3bdb182d8b9

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogIEmmFVcqq0GnDZT:VK7DDeKlogIEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 57e927a44b5c3dbe34e584c47c703c561e64cac16d918b1ab1d1a66c592a7c3c
    .elf linux x86