General

  • Target

    3b79b50996eafda2c90f34144d700521da5f37021028deaafbb83f7cafa8a551

  • Size

    109KB

  • MD5

    c80705141aea852163532e7b259722f0

  • SHA1

    5027cda6ab636352c39ff790fff948434c2cd054

  • SHA256

    3b79b50996eafda2c90f34144d700521da5f37021028deaafbb83f7cafa8a551

  • SHA512

    acf6996cde577d4f287b66f0c693037e290d69bafdf2327dd43b0adc78318ffc877f70c48ae7b898e6567c108bb8014873f14b4ba4070c571fa9e68eb5427a3e

  • SSDEEP

    3072:3b++cZ9PFjxLOVF8Cda4TQBehdc8qRVhL9vR9sBmST0nYXbg1DE:a9PFjxqVaCM1CdcVXL9vDsBmST0nYXbL

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3b79b50996eafda2c90f34144d700521da5f37021028deaafbb83f7cafa8a551
    .elf linux x86