General

  • Target

    f3bdb21eaf4059361ed67c10bc68a692ef2a325c4080b405ee03a41be3cc12da

  • Size

    89KB

  • MD5

    e2d29bfcecf5b9ae6e0cbec75e893e84

  • SHA1

    32d81fc1a9967473e61965fb2eac29c77bb7b613

  • SHA256

    f3bdb21eaf4059361ed67c10bc68a692ef2a325c4080b405ee03a41be3cc12da

  • SHA512

    86f888daa3ed84b99616851859283a837670f9343020e66374f20a39a8a21d37ff5e457740dc6439bbf982d667d0585bd9942d527ef8837df7a1b01593baf330

  • SSDEEP

    1536:e8k00ZuVRHPCiUBlWbmUM/Ctm02AFs8XqbcfcgMatV/yRyLA7wDac:WZuVRKKaUM/C402AFVqb+cgxD/yR0A7Q

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f3bdb21eaf4059361ed67c10bc68a692ef2a325c4080b405ee03a41be3cc12da
    .elf linux x86