General

  • Target

    3e80a09926135c023c03dcc338f2b2378b9ec23fd19e47b10f392158384d2cd0

  • Size

    107KB

  • MD5

    d72b2801b27568aa5160999323bb7c1e

  • SHA1

    a820a8b7a23b5dad56ba7685b5aa5b7eb916fa34

  • SHA256

    3e80a09926135c023c03dcc338f2b2378b9ec23fd19e47b10f392158384d2cd0

  • SHA512

    d5ddb1c1068ee580164130455c80b1bbc91e58a67ae3b43b853321f40f27560f187c1be2f4e6d9e36f77070400daa771d035f5f7ce9e1caff38c1a99b6eff8d4

  • SSDEEP

    3072:j6hfXDU1XTsGh2F1UhLIbJ7qnpmoH7l6QovkdrE9hWaM:jwDMDsGhdAJLoH7EQovkdrE9hWaM

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3e80a09926135c023c03dcc338f2b2378b9ec23fd19e47b10f392158384d2cd0
    .elf linux x86