General

  • Target

    d5440265d562d303cc6af08bfc732561

  • Size

    97KB

  • MD5

    d5440265d562d303cc6af08bfc732561

  • SHA1

    c5c73d6a6816b5e7662ea5e7fbbe909032cb91ca

  • SHA256

    cd803b83687e41d4554bea35707805cb6c674c34b953e6be7af50f54d1c1e979

  • SHA512

    ebeae49f6b6822770eb579a3cabbdfb9d2028d293286257328bf899a9540f8daa64caf6b2c09f24e9862da2ce31f18dced1cefd576cce4e3eba8c23320d0d134

  • SSDEEP

    3072:dUICodUWUh917j8mc2deiPUDAZURyPfF5hVTFvxinf0OzTyoQQub:tdRu917j8mc2H5Z5Pd5h1pxinf0OzTyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d5440265d562d303cc6af08bfc732561
    .elf linux x86