General

  • Target

    362bef5c127ab2c3e9e401885d34106e1a3b8c20323be3a7e67775aefdb7d0e0

  • Size

    122KB

  • MD5

    1d9829870bb5b781243ae9c13fb722f6

  • SHA1

    c16fde13a4b0b84aeaaedbee57c29c8f138bbdeb

  • SHA256

    362bef5c127ab2c3e9e401885d34106e1a3b8c20323be3a7e67775aefdb7d0e0

  • SHA512

    88d17ddafd2c6b5806f3c8b1ac338e315254b5531f2b7fa9ff3ec9ebeecd763bf283b325c741234a4400276d433d7205e29bc7fb3c263b235f163280bf68f8fb

  • SSDEEP

    3072:lZj9DooJaaYMQpfe7OetJ8add9QzTsubeTg4NKcXeGcgqGK:lZFQBe7OetJ8addQteTg4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 362bef5c127ab2c3e9e401885d34106e1a3b8c20323be3a7e67775aefdb7d0e0
    .elf linux x86