General

  • Target

    36dc120206f1bd2a71d2ea468dcc17590de42911ca15a7c47d4540cf958f4496

  • Size

    98KB

  • MD5

    745780cf365f4004afb36baba34dd897

  • SHA1

    738a89d93ec8b3e6dddfc7646d2a885346d06798

  • SHA256

    36dc120206f1bd2a71d2ea468dcc17590de42911ca15a7c47d4540cf958f4496

  • SHA512

    f2c787082373de739c7cbb1b29acb7d47edf07e80640762961f0ee543e75ecb642754318a2881e6fcc91559303572c461b201dde44a082e7285e8d38a8456805

  • SSDEEP

    3072:83N2HQV7IexMcvzbd5RH69nHhCm4KKcXuGggYBK:+yoJP7RQHAm4KKcXNggYBK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 36dc120206f1bd2a71d2ea468dcc17590de42911ca15a7c47d4540cf958f4496
    .elf linux x86