General

  • Target

    36c74ba009281275dbd8d923d51bca8e2deeea47fcb78b0ff35abb8bc251d4ff

  • Size

    92KB

  • MD5

    c73f10521dcd9c7839f57c0781befaa7

  • SHA1

    de8dccdeda0126314334dcac7d9728675d660d5f

  • SHA256

    36c74ba009281275dbd8d923d51bca8e2deeea47fcb78b0ff35abb8bc251d4ff

  • SHA512

    70146580af5a3d1576c5ff7bfaafe1a6f2fed42318fa058a5c4237cc81eaa778e9be4b522f0e3ed9f8c3e2372f82415730af045ef614e08c40c51515217c897c

  • SSDEEP

    1536:0yXDP3ZhUNUPXPKmYQaC/Qdk5cc/z4d7J2cNU5mZ5hlv7w882PM37K8PN2UrYe:vXj7UNUPX5YQJQdScc7M7JFp5hlTw88F

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 36c74ba009281275dbd8d923d51bca8e2deeea47fcb78b0ff35abb8bc251d4ff
    .elf linux x86