General

  • Target

    ba3684293b84beae156255084aaba3cd6cc72c5680307a689184f98a0f8b24dc

  • Size

    97KB

  • MD5

    0290ad1847d116223234c8728a21e52b

  • SHA1

    4c06ce7b817676fc0cd8c9cf330f4725734aee2e

  • SHA256

    ba3684293b84beae156255084aaba3cd6cc72c5680307a689184f98a0f8b24dc

  • SHA512

    41d0b6864ced2455d31b15df52bf659a9686db5ba1009046aa20d42aa549e358cef65790f2376ab711d5f3f5435e5422c0caf30a678f451958891f48b303b53e

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogCEmmFVcqq0GnDZT:VK7DDeKlogCEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ba3684293b84beae156255084aaba3cd6cc72c5680307a689184f98a0f8b24dc
    .elf linux x86