General

  • Target

    39097f23707154c55d7268c6daf84425e3f49d01f4152cdaf2970526296afe6e

  • Size

    124KB

  • MD5

    fb658528bee7b99c313d1bfc47d12d4e

  • SHA1

    6f9dce6351f69fe0a9fdcbce2956b5ce00b3b3a1

  • SHA256

    39097f23707154c55d7268c6daf84425e3f49d01f4152cdaf2970526296afe6e

  • SHA512

    670e6e8c483637c7818966f6abae7e3eb2a50e1c3590f40ed8297ffc51576d80fd22ec08064e837405f7d39617f8fe617ec07df32b6169c5a90f7f16e5a252d2

  • SSDEEP

    3072:QTCrYO15UwMEiy/eBOCWuy/d2cDLoY4giAGaJpP:QTCrNBMTZXA/d5DLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 39097f23707154c55d7268c6daf84425e3f49d01f4152cdaf2970526296afe6e
    .elf linux x86