General

  • Target

    430177c33a14251426928a068ced53fdfbb1fba6dfc8bffc1c88ebe4064fecf8

  • Size

    120KB

  • MD5

    fec1cb820752e19f95823218321dfef8

  • SHA1

    8c00a22d863e2bb38cf076b36911be2c0da48e9d

  • SHA256

    430177c33a14251426928a068ced53fdfbb1fba6dfc8bffc1c88ebe4064fecf8

  • SHA512

    1dd292ce9698c33e37f1e17e77f7daac1dd4196d5660adcd27e6e6df08fd14dbd1c45224ce866887da939b9108c894d52950b5c73acc56c4ee1437b1646a1aac

  • SSDEEP

    3072:R+IIeP00LTSyYSX0CPiFYyDgdAmml8chTj3aKYuM:sA1d1yDgdAmml8chTj3aKYuM

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 430177c33a14251426928a068ced53fdfbb1fba6dfc8bffc1c88ebe4064fecf8
    .elf linux x86