General

  • Target

    531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb

  • Size

    126KB

  • MD5

    a8b48578cc57933a0e3085974b4913d5

  • SHA1

    7dfce31c3dd12b262ce9110e3f51bfe102cb9ac4

  • SHA256

    531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb

  • SHA512

    84eeb8539463675aeb9f07055643db79e70f5b34c2600a82da2d5cda036b93dad21ecc1c3aabe75de44a7667b546145f9217550a1bfa3794ae6e5204e0eb8ede

  • SSDEEP

    3072:5mNXkOR3wiTURjAGhdEetJ8add9QzTs1TIt47KcX6GcgqBK:gk+wd6edEetJ8addQiIt47KcXJcgqBK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb
    .elf linux x86