General

  • Target

    3fefabfdef206c22731e76ef05f6e924497868e490c836794e6f502573373ac7

  • Size

    97KB

  • MD5

    d3a0a070060d123173e584191a340ef0

  • SHA1

    f370824ce3351252eff61870e17978ff0f450ac0

  • SHA256

    3fefabfdef206c22731e76ef05f6e924497868e490c836794e6f502573373ac7

  • SHA512

    5739b12c67c5a3262f87ef7dcf4e323bd17f730435cd42b82cc980e14611bbcc11be6838e173ecf600bd08f85484485e66d9490eaa9bc9e8381a926ea9796f08

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogAEmmFVcqq0GnDZT:VK7DDeKlogAEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3fefabfdef206c22731e76ef05f6e924497868e490c836794e6f502573373ac7
    .elf linux x86