General

  • Target

    3a3980b182da35e3f6e4e1db77669d601e75d9161e5b49ff0d1f305a8d7380de

  • Size

    107KB

  • MD5

    72d0c8d61ab1f89aca67b5ea87d72bf7

  • SHA1

    7a392cee2dd8e04799b6666d4748adfcaca48bbc

  • SHA256

    3a3980b182da35e3f6e4e1db77669d601e75d9161e5b49ff0d1f305a8d7380de

  • SHA512

    d083ad2f6e1560e0956d3e8581f1c9c5a934c436835f3108cad4616d617627253284be18f6530221f271d463c01268b12e01a2da82a791fb5ba3e923817da99d

  • SSDEEP

    3072:QH8J1l0IPgUbmgPgImv+qXGPSf9iVbmqK1cLHknnUTW:QHclMUmSgbBHf90mqK1cLHknnUTW

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3a3980b182da35e3f6e4e1db77669d601e75d9161e5b49ff0d1f305a8d7380de
    .elf linux x86