General

  • Target

    b52ef24745c69dc794e8f90c0be9814966279e3a78f7b3f7d1b4314e89f15e8a

  • Size

    153KB

  • MD5

    1e49165bbe0fec04d7540aa3d88ddef8

  • SHA1

    09eb21f07cb888d4005a411891e7f40316050ec1

  • SHA256

    b52ef24745c69dc794e8f90c0be9814966279e3a78f7b3f7d1b4314e89f15e8a

  • SHA512

    37763ceee5e4d7231e70607baab2e20d7ecb0f2f8317c637a86c1885c375905105875116d24b0af515bb359ac6617ab6f2598d51aadee9a972c58c383c519d5b

  • SSDEEP

    3072:t/XqFIYRrQX1qNpd+Me7wCUhuOlV5MZHbxhY/XH90PfNatph1:tvqFBNe0CUh9lsZHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b52ef24745c69dc794e8f90c0be9814966279e3a78f7b3f7d1b4314e89f15e8a
    .elf linux x86