General

  • Target

    359330fc6794a373d1e714f09429dfa11ebf928570927fbc85dbd80f570487bc

  • Size

    153KB

  • MD5

    5d13d976de809dfbc3e15b19bfd32a68

  • SHA1

    f9614d78f870c586229dddb00bc29d2415bb3515

  • SHA256

    359330fc6794a373d1e714f09429dfa11ebf928570927fbc85dbd80f570487bc

  • SHA512

    85692dc0ea8707fb124cd92db4db8e189c1623de399407d8b5b1bec1f06982ad35f72de299b27687ce8d8998e1b650d65348219b14ae471acc07c6da96684f31

  • SSDEEP

    3072:pDlofdV52tXrQX1qNpd+Me7wCUhdOlt5Fc8HbxhY/XH90PfNatph1:pBo16Ne0CUh0ldc8HNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 359330fc6794a373d1e714f09429dfa11ebf928570927fbc85dbd80f570487bc
    .elf linux x86