General

  • Target

    3a9b44fd3bdd8ab2f69159e4ee033ade8ef7ff6c08bcffb2c39194b813e85889

  • Size

    78KB

  • MD5

    a3850860809d87d7d4bf2b4dc9fc62a4

  • SHA1

    d1236e99a67cc5692f34e3517ba3feb35b566e76

  • SHA256

    3a9b44fd3bdd8ab2f69159e4ee033ade8ef7ff6c08bcffb2c39194b813e85889

  • SHA512

    efe167317cfa674ed8943f27deaa4511128cf01377d37abb96fcff6c9199d5310f76ec9dcefa21674d5de700e75313ed511e2cf5a9574008827f9aa1876bc31d

  • SSDEEP

    1536:V+nnXJUWU8GWklTtyxr1cS0mRI48Kmmynu2DkmLI0VOCsXUfBjk:V+ZUWU8/klxqr2jmuRn1kmU0VOCuUfBY

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3a9b44fd3bdd8ab2f69159e4ee033ade8ef7ff6c08bcffb2c39194b813e85889
    .elf linux x86