General

  • Target

    396932e430271f556703560035fc943cef55781966639ce8a8da44d82f81ee0b

  • Size

    94KB

  • MD5

    19a0e08b826e6b374e3d45e7d19bc988

  • SHA1

    97470fa0811656fc31bf030b0f189608fbde045e

  • SHA256

    396932e430271f556703560035fc943cef55781966639ce8a8da44d82f81ee0b

  • SHA512

    a4a0f8336c43040b2d4b72a9744a3a8142491d8f0e78b896f30b62cc6dd98ac6b7df190b1244fa191aae2ddac367af0de438a44638d38a253b1df29d6a4ad39d

  • SSDEEP

    1536:IECG+bbmzaFtLWSc/CqsWopIhF28Vise/wTP/k9vmmiIVcqqzIGnOZT:b+Xm/l/CqsWopIeXegvmmFVcqq0GnOZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 396932e430271f556703560035fc943cef55781966639ce8a8da44d82f81ee0b
    .elf linux x86