General

  • Target

    39085795c857452c9dcec2be2f7f230b3d3ef9b8451610b8631989459adc0bd4

  • Size

    79KB

  • MD5

    8a51dbeb44c6c054f482ed6880d2ad42

  • SHA1

    e4a64d1047e3a01dcda78aeb7afa2064bd907116

  • SHA256

    39085795c857452c9dcec2be2f7f230b3d3ef9b8451610b8631989459adc0bd4

  • SHA512

    b6ba18813ac739af2b839f27b5e829440e519c1fa74b91ea407f6a10a8fa437a7a1407f408be79b5c5ac2cb70f1392635b0711e542d0bea0079fd4f6839dc0dc

  • SSDEEP

    1536:UTtKZznUnjCKj6AzXliyu7R6yCG3AsKkhXm0bJBf29Jbms7D0OzTPzxf3Xk:UToznUjfZzXEnM1G97bJB29BmiD0OzTS

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 39085795c857452c9dcec2be2f7f230b3d3ef9b8451610b8631989459adc0bd4
    .elf linux x86