General

  • Target

    3ea6dce986708bba6595e7e68212281a7669803260c1e4f909e516d7b62e5817

  • Size

    80KB

  • MD5

    044b76e31bc67f2b15f573b16eaadffc

  • SHA1

    e7348fdd7fd6b499da8f3d424e3a7ca27a143c6c

  • SHA256

    3ea6dce986708bba6595e7e68212281a7669803260c1e4f909e516d7b62e5817

  • SHA512

    950a06baba6b5511573b40118e6a93701b28292dfcac8b67954e8547fc001cb739842da0f90c213cc860353a64685b00f0646a94f47b52d10bd9db9e605a0526

  • SSDEEP

    1536:5tFPivp/+1WAkQuQyzAT0KbkZTcfJIFCgXLZMgOljYbQReR:9ivpxLQlyzAT0hcXgXdMgOlsbQReR

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3ea6dce986708bba6595e7e68212281a7669803260c1e4f909e516d7b62e5817
    .elf linux x86