General

  • Target

    i586

  • Size

    97KB

  • MD5

    48f120f417496a41b07e3b3750e012a6

  • SHA1

    57a3e2885ae90c8f039910d6caf41aec0b27e4af

  • SHA256

    34cf941523209913b3c946fbd389159a31b284cbfbf6cd2e46dbc4d4b37b25b5

  • SHA512

    4ac2cb02a19706da92ddd9ac22bfc7304fb9f1cb18e88d12e38708a019dd6c226080057ea846d93dd8999c9de35a8206d039804faba7b521d0d10cb926a795c0

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQog3EmmFVcqq0GnDZT:VK7DDeKlog3EmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • i586
    .elf linux x86