General

  • Target

    52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a

  • Size

    97KB

  • MD5

    18c3f64efd682fa644fc4db75f924af3

  • SHA1

    656c02bcd81172ebcb562e49c29ccc8093398ffb

  • SHA256

    52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a

  • SHA512

    e96fa4a4fc1c7b899631343c3b423cf1ac133277af0ffe9afa3fc0337bdb9861459c848d537f17efaba3a8215334424c34b69e7070f2ca29029c64368b9320f0

  • SSDEEP

    3072:kA4JmdU2Uh917j8D869ACPhDdAURyv/V5hTT3Pxinf0OzTyoQQub:rdxu917j8D86pDA5vt5hv/xinf0OzTyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a
    .elf linux x86