General

  • Target

    356dec96e0daad3f249dc7794baea76dee11e5c4abf8f3ef3d4b153f7810e2b0

  • Size

    134KB

  • MD5

    8e696648c7a7b592ce6cf17dc59c46b4

  • SHA1

    66f55c556e4747e25e8d23b614420f4d62b765fd

  • SHA256

    356dec96e0daad3f249dc7794baea76dee11e5c4abf8f3ef3d4b153f7810e2b0

  • SHA512

    8e44296112d8769d18384bda3cd6fe72883cf7b73f4acc49a0fd6c9eb32ae42967efd0bb2d6416e558e630d2f36b0c3cf7f3d80c9500ecec1bb1a3e8d3c4ce42

  • SSDEEP

    3072:xUokrePpgVjJWQiyxQxi3F2hMR+Lm3XkcaRVgYAB:xpiePpgVjJWQi+EhMcLm3XkcaRVgYAB

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 356dec96e0daad3f249dc7794baea76dee11e5c4abf8f3ef3d4b153f7810e2b0
    .elf linux x86