General

  • Target

    3ea72e5c8ad7596a4b7697b479e999bb1a2232361717b454f90462ecb7d363f3

  • Size

    153KB

  • MD5

    3dca9e007b7d3549223e7a18e90b837b

  • SHA1

    dec0d2f7f9f77b67ab6e96ec5da21913b3c8059f

  • SHA256

    3ea72e5c8ad7596a4b7697b479e999bb1a2232361717b454f90462ecb7d363f3

  • SHA512

    c3f71cff9ff57921b3d2a1e444869da0382c769d19fef7996c8e75ffb38acd540072b0af2b9eca1bb0b578e1b70b53d26b9d1cd65fd1ae705a265b11733dad56

  • SSDEEP

    3072:biMk4vTr3HdwCLsSemNbd6Olt5JDL7CXOXH90PfNatph1:bTk4v7RNbdplBD/C+XH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3ea72e5c8ad7596a4b7697b479e999bb1a2232361717b454f90462ecb7d363f3
    .elf linux x86