General

  • Target

    3de9b350fd33cddb3580b905c90c5bb36f4a8b09154e738e4bd5783d1e7661c3

  • Size

    148KB

  • MD5

    9bc92b35057ed583ca4bcc9cdb89e770

  • SHA1

    59d8756c43602a768fcd401a61e6395d7f684e0f

  • SHA256

    3de9b350fd33cddb3580b905c90c5bb36f4a8b09154e738e4bd5783d1e7661c3

  • SHA512

    5caa022090b8db9085bd3174ed814083c52cbc08263eb2b648dee1f610271aade28a7551d49471c4238271bdea8e3eb332a379206644d2dd3191170d4c9b6d26

  • SSDEEP

    3072:HuJc+Ga9UtxUVVpSE8JqMIOlVGXalhapRwWriH90PfNatph1:ZcQEx9MPl2ewiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3de9b350fd33cddb3580b905c90c5bb36f4a8b09154e738e4bd5783d1e7661c3
    .elf linux x86