General

  • Target

    36b7970a70c43587dc8e4d7d6aadd764632c1c93274dbf90aa0715af12fe761e

  • Size

    77KB

  • MD5

    f5bb62c2521f52935af4ecdfc5647ccc

  • SHA1

    089a62cb59f38dc9e51900520ddab00b392918df

  • SHA256

    36b7970a70c43587dc8e4d7d6aadd764632c1c93274dbf90aa0715af12fe761e

  • SHA512

    5d76cf3d26b7783ad500ae06bd74576efabbe3f2aea5a51e3c7fb7b1b493bb1deec35c83fe414dc06a33c16b46ad0f2e4617cc98c66aa26a33b651486ed41a1e

  • SSDEEP

    1536:E4HdzhWhNGX+BWsMBhqJNKmND5I5RreO4D8+XvAwXs310OzTPH+jPez:NzhWhNfUbBhqJNKSIvreEIvAwXm10OzP

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 36b7970a70c43587dc8e4d7d6aadd764632c1c93274dbf90aa0715af12fe761e
    .elf linux x86