General

  • Target

    3e84d15f2f557e892fa36765a9d58de6d9f15e357d92d9315519f5b7c8dc3cff

  • Size

    121KB

  • MD5

    2f6f34061ffc830c0bda28aa6b7cb956

  • SHA1

    4ae501bb66560f6a481c20a13be2432dd455407c

  • SHA256

    3e84d15f2f557e892fa36765a9d58de6d9f15e357d92d9315519f5b7c8dc3cff

  • SHA512

    e88b5b3317e3cdf7e2d7b12265611cd86de9dcc3633afb596e87ab403b7e4a0bfb01b0a11a2456b3fc5de66ab97679e436e6fb104387ba8f43ead6966d8141bd

  • SSDEEP

    3072:xUoPV6UkzF7JNa4f6qyI2Ar8jp1PYZtDYo6IhEmqP0taK+xhcLF:xU5vlNDSdvjp1YymqP0taK+xhcLF

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3e84d15f2f557e892fa36765a9d58de6d9f15e357d92d9315519f5b7c8dc3cff
    .elf linux x86