General

  • Target

    356a8313c32b96c9682e1a9bc2d8e2760f928d8282aa7e58fc770745005740d0

  • Size

    153KB

  • MD5

    a8a60a81071f2d8919a295678ed98423

  • SHA1

    67afbeb03d8a9e5edf76c7aaade738191c317f07

  • SHA256

    356a8313c32b96c9682e1a9bc2d8e2760f928d8282aa7e58fc770745005740d0

  • SHA512

    c90a3c7ea493da99232cdeecaa758a71669fa1f17292b08f4c4e2bf9aec1531931c835c8c054c118f961488efb17e3b26f7d48db23b89206cc9815355dec198e

  • SSDEEP

    3072:bDLYBNKtyZrVvnNYd+soZS9BF6Olt5MofR1c9OXH90PfNatph1:bvYBw+qwS9BFplEo51ckXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 356a8313c32b96c9682e1a9bc2d8e2760f928d8282aa7e58fc770745005740d0
    .elf linux x86