General

  • Target

    3c307755460cceaea144d0cc401257a061545b31507f850318b7cc6967cccb46

  • Size

    72KB

  • MD5

    1194b1aa1b3026d85c8841ac150c6cf6

  • SHA1

    283f86f01dae28926cf11f2aac94c6eee27d6437

  • SHA256

    3c307755460cceaea144d0cc401257a061545b31507f850318b7cc6967cccb46

  • SHA512

    f67c980252a7ff30c2654349cca1cc1723c6b15580eafc3b9bb2fbe523061f091545aa83941a5242c65933b473e180fa0a54e110651f318b7b3c575c0234195d

  • SSDEEP

    1536:nm+c5osQWiKLoxKFn6pD+OTxzM3MmLI2VOCjXUfJRk:45omr0xKFn6J+OAMmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3c307755460cceaea144d0cc401257a061545b31507f850318b7cc6967cccb46
    .elf linux x86