General

  • Target

    3fbdd2a1af07ba57212df89ebac25a7b21550d3cf4031bf3324f4751653239e2

  • Size

    99KB

  • MD5

    36dee46232f07f906d45f9859833b072

  • SHA1

    d5074bee52daf45490036b3cd3e68d6c691ec683

  • SHA256

    3fbdd2a1af07ba57212df89ebac25a7b21550d3cf4031bf3324f4751653239e2

  • SHA512

    cfc60f64e5fa81d43f5b707af11c9f793777d48f7025ac54981385b41ac93afa3b21fb48d4d414f5cdc511baff3c28dfb30d70f0233b0ad0fbf78cc8d58d3f87

  • SSDEEP

    3072:Qh0cLCNUUbWp6spvCuZxdGNKYxCkxlUmmgXchQ7IagHM:Qh02wWs8BrLiZxummgXchQ7IagHM

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3fbdd2a1af07ba57212df89ebac25a7b21550d3cf4031bf3324f4751653239e2
    .elf linux x86