General

  • Target

    3af803bf4bfe0e1d501a321367934b8afd5f35dff22c7d2a4b00ab1334983a32

  • Size

    112KB

  • MD5

    a0e67f4931b3c0d740e6795c80000085

  • SHA1

    e92afda7687348dd439729e83be483f4ab47af4b

  • SHA256

    3af803bf4bfe0e1d501a321367934b8afd5f35dff22c7d2a4b00ab1334983a32

  • SHA512

    f766ede26ccbbe666ffe7cc0b65daa7fd8ba343f860ef724f71d641ac31213ce570ff0e1cfdb03005a81548fa3cdc36c4201f92be3a5650bba379a22f8631a69

  • SSDEEP

    3072:/ac2U4IfEKPy2aE2MuUetJ8au49QuTsGzf3v2kP+GlUQXvnl:Q8v9huUetJ8au4lVzn2kP+GlUQXvnl

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 3af803bf4bfe0e1d501a321367934b8afd5f35dff22c7d2a4b00ab1334983a32
    .elf linux x86