General

  • Target

    assailant.i586

  • Size

    97KB

  • MD5

    2fc7a6af0930180d61de32e94b9454b6

  • SHA1

    8b0d585cf2c2ef75393dc31fcaa22ac46ac74ed3

  • SHA256

    6388aa07338ff0d4b596d327d72248ed58a7a14a476bd6ad17a198c89b731272

  • SHA512

    b933bf5ff05a25f2b0475d06c12742edbad0e309b856075b3886ef0085e4f3797044e2a8da2fc305c3801c6c49b03be29d43058f54eacf862de1b50af68cb200

  • SSDEEP

    3072:dUICodUWUh917j8mc2deiPUDAZURyPfN5hVTFvxinf0OzTyoQQub:tdRu917j8mc2H5Z5PV5h1pxinf0OzTyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • assailant.i586
    .elf linux x86