General

  • Target

    52eeaa3762fe6a99ae6153cbc2a489a60764bf8682788f4982676bac010a9bea

  • Size

    98KB

  • MD5

    7d637c4e8f4b9c028a1bbaceda926af2

  • SHA1

    0dd88db3b40ff23acd6ca5aa660734a2074f86a0

  • SHA256

    52eeaa3762fe6a99ae6153cbc2a489a60764bf8682788f4982676bac010a9bea

  • SHA512

    0e7bdefead73e10df5be8af6d1002f137e60b2a1357db3f0aa427dc81dd18ab86b6b05313a474db22cbbe251ce72db64ae02d0d4a4d753e13374855db3391012

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqe6F1QmqoVcqq6GnQOT:heZyo5Kqe6PQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 52eeaa3762fe6a99ae6153cbc2a489a60764bf8682788f4982676bac010a9bea
    .elf linux x86