General

  • Target

    3912c9c71983ad8932346b6027c1602ad4ecc45a308d19dd7efafd44ff001d1c

  • Size

    97KB

  • MD5

    ec0d1b782d9ed9a19e33ddd8ac1c55c5

  • SHA1

    3fa71aecd741047068c30fe8fd9712926eca18e6

  • SHA256

    3912c9c71983ad8932346b6027c1602ad4ecc45a308d19dd7efafd44ff001d1c

  • SHA512

    93136d54116c2f77b5f13b7378c3ffcfb1acc0b7f5035cd7836a6d4c97c0720890163b500db343632c12b1cd65f5f86d8682aab67e38b2133a13bbf74edefb55

  • SSDEEP

    3072:UwYfmdU2Uh917j8D869ACPhDdAURyv/a5hNTzKPxinf0OzTyoQQub:Vdxu917j8D86pDA5vC5h94xinf0OzTyv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3912c9c71983ad8932346b6027c1602ad4ecc45a308d19dd7efafd44ff001d1c
    .elf linux x86