General

  • Target

    3a5dfcf6bb4cf661a7598b0196a367e1afaec89d09952531bc60f2c497848e6b

  • Size

    109KB

  • MD5

    5b0fda7efd06d64078ee6fadcb302758

  • SHA1

    fc27b7b0f68fa2e66c8e0900698d457923696c9e

  • SHA256

    3a5dfcf6bb4cf661a7598b0196a367e1afaec89d09952531bc60f2c497848e6b

  • SHA512

    edf8156ef450fb453acc3edee836ed8b0f1c6a929c8ef3432614adb83bc83cae38fbd3f6e306b6ac5c6ed2d3c1b8631243f38aaf6373de1b2bed17b8b737e089

  • SSDEEP

    3072:Fq4vFGv9K6jFNOI1JpgvZDCCKA/WR5emz5STnoaBmST0nYXbg1DE:9kv9K6jFII1XgIW/Wf9SToaBmST0nYX/

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3a5dfcf6bb4cf661a7598b0196a367e1afaec89d09952531bc60f2c497848e6b
    .elf linux x86