General

  • Target

    3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7

  • Size

    156KB

  • MD5

    55e7c8977fd3ee433aee7398ea0d7443

  • SHA1

    6801bb24fd8151f58695ee15b69fffb4bf7a5163

  • SHA256

    3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7

  • SHA512

    b93c4c9492182b4478702ae1cffe296c0a72d46ed415da3929ae69a610e2a3c6725c66809225a452eb52e08fc52ea78988de0480e437e5babf462e9563f8241d

  • SSDEEP

    3072:WBkUKqrtPjPo9+tu6oIGzxvlZGMZCY5T4k/2/PoZ:WBknUoV6oIG1vlZGMZCY5T4k/2/PoZ

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3b8c2a7692b6efd015ad54d3d7694cfe2f219a4b831a11a9cb610cf45b2a82c7
    .elf linux x86