General

  • Target

    3fb788ff82f110899e9dc19f1e3b228b7efc6acf9586802478e67329d5af7479

  • Size

    130KB

  • MD5

    a5ae2989093a93228dbcbe770bf9de0d

  • SHA1

    52dff01c429dea91132f452e04afb188fecfd8cb

  • SHA256

    3fb788ff82f110899e9dc19f1e3b228b7efc6acf9586802478e67329d5af7479

  • SHA512

    157dd5b1d0a8aa9e1cdb65258b098a1954ee54bae018f68abea32da39aa90c8fcb2d0660f882eb4c59d213365a0a5b323f7c8e9babbae596727c6aef3ce94b4d

  • SSDEEP

    3072:2YGkTN53stRkxzaZ1Zj9SNCaetJ8add9QzTs8WT0DMg47KcX6GcgqBK:2YlTIetsUNCaetJ8addQQPg47KcXJcgv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3fb788ff82f110899e9dc19f1e3b228b7efc6acf9586802478e67329d5af7479
    .elf linux x86