General

  • Target

    39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b

  • Size

    87KB

  • MD5

    f7ee398de04571dfda89fb22350e7df0

  • SHA1

    7dce6814c200b23f2aa704f81e510d61cc8e2a7f

  • SHA256

    39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b

  • SHA512

    7992020e96a6977897743bf6d4f16bb1984e9b88f3eaa469d4686c1e4dda51e425fdea1a3a1969c8ddd65b0e8d194d20c6822c6a4d10b1ea595ea343df7c3144

  • SSDEEP

    1536:pSeQ78xfyi86Xml89Tvnfhd0hsQTkJluFkw5L5SPsLOnPGJUkft3LR52wm:pSwxTWWdvnJdapAJjwx5csLOnOJUkfxq

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 39506e0b7169f4da8ffa5970d599d1f11871e9f1914ae148b0be1b165aee7f0b
    .elf linux x86