General

  • Target

    3688fff62ccc5ec97e57813b7d71a8fddc9015cbdc710853725ad5eff4af1438

  • Size

    153KB

  • MD5

    d214385e59aac4e9d4422e3a27918d6d

  • SHA1

    b4844e5edd20f4dd8ce4936b826ee449c4bd9db8

  • SHA256

    3688fff62ccc5ec97e57813b7d71a8fddc9015cbdc710853725ad5eff4af1438

  • SHA512

    e17f6943663e14fb0e338a4f971895bdaf3b15f235d33efd548e15f3a6842f674a33da6587a64c61702dc6466b000a087d03b1e20cca5dc01f3f2d0a19efadd1

  • SSDEEP

    3072:XlEoRSgLyZrVvnNYd+soZS9BFuOlV5BBYfR1c9OXH90PfNatph1:X6oR5+qwS9BF9lhO51ckXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3688fff62ccc5ec97e57813b7d71a8fddc9015cbdc710853725ad5eff4af1438
    .elf linux x86