General

  • Target

    3fb5b6fca7c05af540677fc21fffd766287251efeeac22ab88a58d8fefd76ac4

  • Size

    164KB

  • MD5

    55e526068431a36aedcf34d247d74bc4

  • SHA1

    96e6d9de495e4c40e4d8c90156d8b80a114347d9

  • SHA256

    3fb5b6fca7c05af540677fc21fffd766287251efeeac22ab88a58d8fefd76ac4

  • SHA512

    5e61e06dd5ba69f3144322bdf878b8f204645d246fd49be11d5d51f72e19bb3b8c94c6382c02d2aa49381339f9fb7d7366a94939ce251a8ca555bf60e241b766

  • SSDEEP

    3072:gNz6rS7+TPDcVjQWs6J1S7vFmUWiriKF2br1I0NOXMZhsGmbeL4jDPY1yE/vHtsS:gQrJTPDcVjQWsuxKF2/lNOcZmbeL4jDK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3fb5b6fca7c05af540677fc21fffd766287251efeeac22ab88a58d8fefd76ac4
    .elf linux x86