General

  • Target

    35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2

  • Size

    85KB

  • MD5

    8c4bbfef5c4e93cfa936686758cb0613

  • SHA1

    204431185b7f9078ddd82d608ac2e427aa3f3f1b

  • SHA256

    35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2

  • SHA512

    e36db7b2c0117ed680a91a161b31cdca1e7b40ad07331d5473410da32ce66638d840796cef285a677664eed617708678e561dd275a6415644b8bdd3409d0f800

  • SSDEEP

    1536:f4rEUHe3QUzEPuTs5loupkqBYlww9k4cgtAPHc5hCosG7she0QzUzJYQ2Wk:wrTLUwmYwup0wak4rt5hCe7Ue0QzUFYV

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2
    .elf linux x86