General

  • Target

    38acd7eee9202bb1307e67e7074d2eb3187a7cc433f8a6962d698f9707475d41

  • Size

    75KB

  • MD5

    e6b5cf75c55174181b4a32896a9b7b78

  • SHA1

    0d5b0d7aa36743e62891929ccf50088318543a98

  • SHA256

    38acd7eee9202bb1307e67e7074d2eb3187a7cc433f8a6962d698f9707475d41

  • SHA512

    246bf2df98332be89ed6a2106230bc4b6d387309762ffd9ce69636de0d3ed8755c5238bf01c0a24b15e872198c7e8ab28b7e1e65e1dd6d9fab423ca5bdf6ba62

  • SSDEEP

    1536:/ZPpN8UdU7UL8gcEX40f+66w+fDbD06O4QzItCqVqLzKQyDmIJhyE3GVKbZV:/ZhN8UdU7UL8gcS40fV5+fDfP9hCTnxO

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 38acd7eee9202bb1307e67e7074d2eb3187a7cc433f8a6962d698f9707475d41
    .elf linux x86