General

  • Target

    3e32e4064322071b4e3a1f221ac2b44985d873129f8738376125eebe9f10d788

  • Size

    122KB

  • MD5

    637f008744ff31bb5dd4397c2064f3a9

  • SHA1

    647bf7bb3aba29c019d25b2c73ec1afbc2ecfaf4

  • SHA256

    3e32e4064322071b4e3a1f221ac2b44985d873129f8738376125eebe9f10d788

  • SHA512

    3c31d341609a6f49ee1469ca6c46806f1b1b06ecbc98610fc8273b86c5241f252c92a7cc8a955d36be0994de2b66552817537b3521358ac82c048c4a32fa6d0c

  • SSDEEP

    3072:lZj9Do+aP0YsQpZ+7metJ8add9QzTs+zV42Jg4NKcXeGcgqGK:lZ/Qr+7metJ8addQLe2Jg4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3e32e4064322071b4e3a1f221ac2b44985d873129f8738376125eebe9f10d788
    .elf linux x86