General

  • Target

    3576532e1b1204ee925674a0248489cb08e56a1a662d80d4a147ba30e8fcfcde

  • Size

    98KB

  • MD5

    b203ccc639038cbdc55e7e3f32b6f7f0

  • SHA1

    7d29ade59a1da601619e5b412486875055e5d80f

  • SHA256

    3576532e1b1204ee925674a0248489cb08e56a1a662d80d4a147ba30e8fcfcde

  • SHA512

    73cfff6478708aace9cebd3032b8785caae91e0aca8834dc693261be541033987cae7f4d8b2cebb6997be00b52d7e8a58952e1af38941771b32c46aab2e3d783

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqesF1QmqoVcqq6GnQOT:heZyo5KqesPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3576532e1b1204ee925674a0248489cb08e56a1a662d80d4a147ba30e8fcfcde
    .elf linux x86