General

  • Target

    3a12e8324b6095aa7ba4f63b20993d2c9e6e7d0ae4a897719ec28a48c0eb9e94

  • Size

    113KB

  • MD5

    b6ed5fc8c13453145b0ec4952cb18cb8

  • SHA1

    4b24baf17f81332bfd93e39f88b490878b0d995b

  • SHA256

    3a12e8324b6095aa7ba4f63b20993d2c9e6e7d0ae4a897719ec28a48c0eb9e94

  • SHA512

    44690a79c122afb313849d122c5a0332ecb0f60545beef5cb37f7f68abc99f14ce59f5753a42afdbc94faaa38f1bef2343fe2e3082947e8a10668e74640ebcc4

  • SSDEEP

    3072:lLQ5paFGq5PBSVjDW6kwh2LQ68E97JEXPk7fD162szANTjsEmST0nYXbg1DE:l03+5PBSVjDW6zNu1EXPOfD162F3sEmo

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3a12e8324b6095aa7ba4f63b20993d2c9e6e7d0ae4a897719ec28a48c0eb9e94
    .elf linux x86