General

  • Target

    3de402d1cfdb304a7d38df836bdde6cb8e3150325aef09ee046d6b10a4cfbc12

  • Size

    111KB

  • MD5

    80b91ff2e0955808aa55478ec6e21ed5

  • SHA1

    ee64e55db9eb0060d83824412d549f3e99547967

  • SHA256

    3de402d1cfdb304a7d38df836bdde6cb8e3150325aef09ee046d6b10a4cfbc12

  • SHA512

    fee335c315c1b968115feb09ecb71521fe0380a933c9f5153e6b5e3d75e841ad715cd4963e933b5edecb3bdb4777790205973ecd363c5d0ecf0e34443f10cb54

  • SSDEEP

    3072:gzrPhQUrrIJ63XqffvDSEsyHRajaLXomqoAcqOfdncR6:gzaesg36vmyHRajaLomqoAcqOfdncR6

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3de402d1cfdb304a7d38df836bdde6cb8e3150325aef09ee046d6b10a4cfbc12
    .elf linux x86