General

  • Target

    3c530b2f9fd9ccf97e90b40210c05b8792f9ccc6488758514f8a3c731e62b3cf

  • Size

    122KB

  • MD5

    d90992a8d68453ee1bad2322e19c94a6

  • SHA1

    70b90c3e5b01ec63cb68aafc64e69c6b78495e4e

  • SHA256

    3c530b2f9fd9ccf97e90b40210c05b8792f9ccc6488758514f8a3c731e62b3cf

  • SHA512

    6a88f47b067a7258295e77ce9089d8bc2f8636c471a49be62ab91f952100a708645d49e6d89379cacb0b8ecf24f0cd790f9c7d655ac70884b745e0be8e1da203

  • SSDEEP

    3072:Jm1sYwWSN4u4vlU3NSEetJ8add9QzTsNzD0t4NKcXeGcgqGK:JEZcEi9SEetJ8addQ+Qt4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3c530b2f9fd9ccf97e90b40210c05b8792f9ccc6488758514f8a3c731e62b3cf
    .elf linux x86