General

  • Target

    3eca1694268bfaea445bfda702ec7d58586e8de7fbd04c7a7b6f4f085e25c9b7

  • Size

    99KB

  • MD5

    27429edf662f160a59b93119104f9aa3

  • SHA1

    6dec964e5dd10b73fa13d35909c7076d51ecd2ba

  • SHA256

    3eca1694268bfaea445bfda702ec7d58586e8de7fbd04c7a7b6f4f085e25c9b7

  • SHA512

    fb537eabfc3fe78b8f1a4fb04d1ec2f53dfc4be8b68bbfa4aeaa1edcfb0a94cd2566fff81ad15885d4dce2f26a29f12922e8fddfee778a76cf9ba58f09788362

  • SSDEEP

    3072:Hx8Zc9G3j1CUF2hrk/xmIba4pS5hAaGfOmiy01RmtQTClh:T9G3j1CbZak+3pS5hAarmiy01RmtQTCL

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3eca1694268bfaea445bfda702ec7d58586e8de7fbd04c7a7b6f4f085e25c9b7
    .elf linux x86