General

  • Target

    530c786aad18d2266e57450e0440a3bb5606578f8f264be80cad13af3691daa6

  • Size

    126KB

  • MD5

    20ea76b53bdc6bfd353ede90022c5226

  • SHA1

    a919dd5d71e0e6359b00c638d2f90abf4cea1d5a

  • SHA256

    530c786aad18d2266e57450e0440a3bb5606578f8f264be80cad13af3691daa6

  • SHA512

    866339c4fd4f5c1167cee8b1102e3a1791587f17a15ae0f297c31384052854dad53b2b6f42501e1b7e6a2ac323a36fb4728b92144c6fcac256dc860c18a8bb39

  • SSDEEP

    3072:5q1XkOuJn+T09KgGh9netJ8add9QzTsf4aTwt47KcX6GcgqBK:UkRJpe9netJ8addQm4Ywt47KcXJcgqBK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 530c786aad18d2266e57450e0440a3bb5606578f8f264be80cad13af3691daa6
    .elf linux x86