General

  • Target

    3a4fdb7637cc70739eaf93eaaa7001d3a7784a3bb8b0b02b59b4aa3a2ebb170e

  • Size

    97KB

  • MD5

    582ef8a9ee2dbf6a9ac50552796b163b

  • SHA1

    25085f86a42b145e53f01fd6366a21946a58e758

  • SHA256

    3a4fdb7637cc70739eaf93eaaa7001d3a7784a3bb8b0b02b59b4aa3a2ebb170e

  • SHA512

    7fad07b366fce126bb7f5962b7c67e4d2c70694b9c9efb1123b59bc4acf2adf34fd6e3865e5823cd1584d3aeff1c49fed31c2f298c503d0ec03d70e79c3b5e4b

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogSEmmFVcqq0GnDZT:VK7DDeKlogSEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3a4fdb7637cc70739eaf93eaaa7001d3a7784a3bb8b0b02b59b4aa3a2ebb170e
    .elf linux x86