General

  • Target

    39c81c6b0006cdbb5b310a1da64878a673e540d25a12d56d05aab463be19a384

  • Size

    89KB

  • MD5

    f0820c16ff012748fae80d7d01920a8f

  • SHA1

    a47f204b9f9fc76d2f9516d513709e7a28d6fb5b

  • SHA256

    39c81c6b0006cdbb5b310a1da64878a673e540d25a12d56d05aab463be19a384

  • SHA512

    2cab308b61f3b88b0c4403b501878281dba8950990028a1240406f60c9e58572ca2252717336934367323dcb2fafbf71b42afa92f978093b28c09683e453c9ee

  • SSDEEP

    1536:mPZ7l3sJOoVQR4k0ZWNMDyIZuUdfwY33h05hBGlJsEWshe0QzUzJYQ2Wk:olBoVQR4MCDyIZ9dfwUG5hBOWUe0QzUy

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 39c81c6b0006cdbb5b310a1da64878a673e540d25a12d56d05aab463be19a384
    .elf linux x86