General

  • Target

    ae3a7bc58c6cdf2f52fe6df2db603740326a89a70e232ee7aa6c4c8c24aeddef

  • Size

    97KB

  • MD5

    3a38ea27050b20a77b7e34ee0c7d5a50

  • SHA1

    f502f9e29a098934571cc5752bad7a1c3884fe95

  • SHA256

    ae3a7bc58c6cdf2f52fe6df2db603740326a89a70e232ee7aa6c4c8c24aeddef

  • SHA512

    8a0b6d3b044220f2a82ca47b33341a787a28c5629d6bacae2f1d32b10e131754711105d6d92d4211a86fcd36e04eea523451ba6d6eced4f500568aae764ed1a4

  • SSDEEP

    3072:gjtwgA6UlYzZveohR9kIENfdGZmmFVcqq0G27ZT:gjhzt3mIENfAmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • ae3a7bc58c6cdf2f52fe6df2db603740326a89a70e232ee7aa6c4c8c24aeddef
    .elf linux x86