General

  • Target

    3eb465c1f2fe11efdc12582c09ab7256dfb4e56f5aa8863c12d86cba1d3743a7

  • Size

    80KB

  • MD5

    03573a900166889b19702449bc41a22a

  • SHA1

    6183c61d2dfdddf4199d5ba729f7c0a006475b1b

  • SHA256

    3eb465c1f2fe11efdc12582c09ab7256dfb4e56f5aa8863c12d86cba1d3743a7

  • SHA512

    ebd9147f311ab96436e125290d95586754d211e90ce70c73c91b9aed0e3472bfe7a8e232e0b298a0a9c93799218bd9a98b569fa5ab4cf77184c3ef1e79e8896b

  • SSDEEP

    1536:29zhqUzUMU1U1UB1zGo5vr5e29swl4FoAo9bRN5mDINeiLZMgOljYbQReR:+z5zUMU1U1UB1N5vrT9sqKov5MAeidMU

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3eb465c1f2fe11efdc12582c09ab7256dfb4e56f5aa8863c12d86cba1d3743a7
    .elf linux x86