General

  • Target

    e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095

  • Size

    85KB

  • MD5

    a754d5108eec2317c26db8e7145a869d

  • SHA1

    8014bb1e88858d28b23c80e0a4e8dc152b7d2641

  • SHA256

    e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095

  • SHA512

    ee03507339c5b29bc0a5f9d38326d3237162294aa6e4a9f5f5db1cdcb07be488cb22e9b1ddf424315ce6ae9b0e1035eba198e1471aa620100acb0b318c6a3337

  • SSDEEP

    1536:CA1dUL9jOWswudVchqXV0uHMfuFDwBLgMGN1gnPwJUkit1O5u1m:CfNudV4qlbsaw5gMc1gn4JUkiXO5u1m

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 2 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • e5575f1a8f4a3a2ae6a5678bc7bc058bf591b69a32fcdc392111de2b5325a095
    .elf linux x86