General

  • Target

    f59c3fc6dcd7533f106338c1f8afea1397255f3ccde66ed3c1813bb348bc9c7d

  • Size

    123KB

  • MD5

    9f3165f722deec8f7848134ebac09c0d

  • SHA1

    7de39796ffc6d73222fc7edc415d9144d9d361e5

  • SHA256

    f59c3fc6dcd7533f106338c1f8afea1397255f3ccde66ed3c1813bb348bc9c7d

  • SHA512

    511a8afe2bb03e995dc8bacdb0d2c55b59ac4f2c2c70fb3baeb1159375fa8a606aed7fa4439b4a52443985db4ae9e2723145b1872961b79d1e236922b4025d09

  • SSDEEP

    3072:fp3vinvc7YMG/Fal6nWNgEFDsS58mmqoYcqL/hnIT6:ftvivckqJ3DsS5xmqoYcqL/hnIT6

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f59c3fc6dcd7533f106338c1f8afea1397255f3ccde66ed3c1813bb348bc9c7d
    .elf linux x86