General

  • Target

    3841f63aab518a3897d3113aed145e1e18202f82353587473808962937576a05

  • Size

    89KB

  • MD5

    62c16b33164f2435ce1ce7b31b01d230

  • SHA1

    91f0c2cd7204c63c9b54853d215fe0f0d759cf2d

  • SHA256

    3841f63aab518a3897d3113aed145e1e18202f82353587473808962937576a05

  • SHA512

    49d9ba08e6e9d8dcb6542cbc709488abb2b7db14e2bd92b8c29d0a8e0599f046077b2f2f6fc222b04f369d96bc27d5ac8c809c53f1e03fcdbe194e61c6cd4d45

  • SSDEEP

    1536:UDTcqQM+NIzzx7grpWpkBLKkuOTa34Tyb/UTgMatK0t64POGEgMqc:gxAI/Vv+JKkuOTaeykgx3t64WGEgMqc

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3841f63aab518a3897d3113aed145e1e18202f82353587473808962937576a05
    .elf linux x86