General

  • Target

    42cc7837609e77a7ab9b64be65091df76bab19a936b812f2afbdc65a87ae88cf

  • Size

    97KB

  • MD5

    31b15fbcb8ac484d7b53afe9e8db9c33

  • SHA1

    2ec842697b0edfe54833ced74b9f57fb77e9a99e

  • SHA256

    42cc7837609e77a7ab9b64be65091df76bab19a936b812f2afbdc65a87ae88cf

  • SHA512

    b01593b2b651983987cbbe18022a93540c5b244c4db11741f2a83cce79210dab32c5e32cb819a18509760b63ef9a629f171f347429720d47148579a37ef6b1d2

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQog1EmmFVcqq0GnDZT:VK7DDeKlog1EmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 42cc7837609e77a7ab9b64be65091df76bab19a936b812f2afbdc65a87ae88cf
    .elf linux x86