General

  • Target

    370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59

  • Size

    147KB

  • MD5

    269ae9cb0ed6ddf5f26d543194e8e8ad

  • SHA1

    c83cbe7a4378123e9f93c8211496b929d3ee467d

  • SHA256

    370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59

  • SHA512

    23b0b2f433d7a9935a26b4e63820b0c61c39679055cfdbeed279d5828168c3fa866c8aea90a574fc31542726d38d3542bd4a5c50f3d6b22c824d449620268b3f

  • SSDEEP

    3072:EbhcV0vFZZxnA/UNQsJpmvSmywrntQL5RTAx5flANpTnO:Eb7tRA/UGsHmKDwrntQL5RTAx5flANpy

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 370712812355329d12ae1a07981c234405dfdee413c6ff3ff502c3b2ef3baf59
    .elf linux x86