General

  • Target

    37c40a6c9091407133ea017c2168341a682bbab962fd460e3e553df6490d7921

  • Size

    109KB

  • MD5

    2de1428b20a930353e11cbe484c93440

  • SHA1

    cd70ddfed466486986d7b548028ee2b5a3d414d7

  • SHA256

    37c40a6c9091407133ea017c2168341a682bbab962fd460e3e553df6490d7921

  • SHA512

    1f031b3f56756693a44f775743406274607fc5512c9386f725abd4157b9200b3f38cf128668c3967293e0d02c4cf63585a456530518994d74c16ed199f473af1

  • SSDEEP

    3072:0Lv7Y5ewUrbLy9mLS9zplSf91vCP1okzpml0CchQ3Za91n:0Lvg8bGm+pIvCP1okzpml0CchQ3Za91n

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 37c40a6c9091407133ea017c2168341a682bbab962fd460e3e553df6490d7921
    .elf linux x86