General

  • Target

    532d5435a09dbf6a2bbe8eb6e39dfcc97ff472bf45e7be465f53c5a02ce4ef19

  • Size

    116KB

  • MD5

    17038baf6a558bc768cbd350b589374f

  • SHA1

    1009631aec2224bc777b7c4a7401245ebc98c247

  • SHA256

    532d5435a09dbf6a2bbe8eb6e39dfcc97ff472bf45e7be465f53c5a02ce4ef19

  • SHA512

    19df837ead191856945f68d2f37765eecc315f9fb313f7b487184aa1c6f71f38bd9393efc14ec8d8dcdeecc7bc08699b0324cf92ec6ec42b0e3d6bc8fe0d7c2e

  • SSDEEP

    3072:TS02wMkcQUKnrld5yv4t/0RJ7BetJ8aQyO1yeb4himS0vnFDQ8QN:+wMZQHrn0saJ7BetJ8a4chimS0vnFDQp

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 532d5435a09dbf6a2bbe8eb6e39dfcc97ff472bf45e7be465f53c5a02ce4ef19
    .elf linux x86