General

  • Target

    3eb614464f30e0931db26ff316d8ecd0786ca9390f8e8b0d62413108c05a4ff9

  • Size

    148KB

  • MD5

    3c386921ecaf52c225c9858d30da68cd

  • SHA1

    74d7a7d43b34fa42ed8c95ff50e5a903c48dc0cf

  • SHA256

    3eb614464f30e0931db26ff316d8ecd0786ca9390f8e8b0d62413108c05a4ff9

  • SHA512

    228c301aa8400ab232eeb4abda3f2df4a6d4922bbb628afc3438406903c5c8ec010057745bb705a1eb86e0a15004e8f6b3e814d220be87dc7be602f2975b40dd

  • SSDEEP

    3072:HU9qBRLjiUB5amVVPqE89qAqOltGWLlhipRwWriH90PfNatph1:L4I5P7JAZlPJgiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3eb614464f30e0931db26ff316d8ecd0786ca9390f8e8b0d62413108c05a4ff9
    .elf linux x86