General

  • Target

    d79667fc8f4069c9c1f59f9b2a323e54

  • Size

    73KB

  • MD5

    d79667fc8f4069c9c1f59f9b2a323e54

  • SHA1

    f3e7df65ffa71263a67312f007796da2ea5ce392

  • SHA256

    7b5b699825639a2cfe86150ea9f5bb16b74a77be122a06f88cd31aca0c66d5b8

  • SHA512

    1abac39b4d12c48095764e483cff3d5171b44e353a88064caffd6d56c451444c29d9e05ec5898afe9d2a7f00b33ed6919a6d4254d55e2e3d77d8184705c52d07

  • SSDEEP

    1536:oYTwZeXrtLu/ntPYxshKbDzSuFqA4bw1u5cuPxBXk3tPO568m:ouZu/2xeEHKA4bw1u5cupBXk3ZO568m

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Detects Kaiten/Tsunami Payload 1 IoCs
  • Detects Kaiten/Tsunami payload 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • d79667fc8f4069c9c1f59f9b2a323e54
    .elf linux x86