General

  • Target

    3bb79e01390af537a5e6791de22aaed4257da3b754d17626b1058105629c1f01

  • Size

    112KB

  • MD5

    122f08bf97c767bced14757d03f1b31e

  • SHA1

    aca8882fe5d89024df9c72286c59b60e0ccb478c

  • SHA256

    3bb79e01390af537a5e6791de22aaed4257da3b754d17626b1058105629c1f01

  • SHA512

    995fe28456f30cd3676bebe26d39d1dad2be5b5cfa70fcffc3876e96a7ea136abb9ae5f296e3730a7f3cbc7dc08913e076d6e3688a1680beb1c33e3dc5bed968

  • SSDEEP

    3072:/ac2U4IOEKPy2aE2MuUetJ8au49QuTsD4waI2kP+GlUQXvnl:QRv9huUetJ8au4lE4y2kP+GlUQXvnl

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3bb79e01390af537a5e6791de22aaed4257da3b754d17626b1058105629c1f01
    .elf linux x86