General

  • Target

    3c6fa8d7eb2109ae69655327d063f84612b7df99587cdd893498f21fc48d75bb

  • Size

    119KB

  • MD5

    77eeb3b43e7a9eac53eaf3b3d5c987d4

  • SHA1

    62daadf778bfc634d39582b6713124611d34eab0

  • SHA256

    3c6fa8d7eb2109ae69655327d063f84612b7df99587cdd893498f21fc48d75bb

  • SHA512

    e3e77e0b85e9eb7ae485eb9728a3168593a9fc4b3402c36f532471e2c8fe5467dac02d540c2c8790c4e74706e7a8d4e37c9819e1f146ed24c4ec0e7f352a8978

  • SSDEEP

    3072:yOcTN+alUNU7dn05fvq8u2gRyzuRIetJ8a249QuTDVcBhf2Sh7yMJ2UcYV:qNBgu0ZCzxRIetJ8a24ltY2Sh7yMJ2U7

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3c6fa8d7eb2109ae69655327d063f84612b7df99587cdd893498f21fc48d75bb
    .elf linux x86