General

  • Target

    52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0

  • Size

    97KB

  • MD5

    ec39fc93806cc7dce3b2eb51e2d2b4c4

  • SHA1

    85b258612668d0e6a0f7d2e7583fee96ff635de4

  • SHA256

    52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0

  • SHA512

    c2e3cd54bb68b98eb11b89a2ef3590d7939383ec520f8367e81009fd8ae96efd91eaaf1540b78227d03da1c5aba72fb63b1805e0034e8c15708ee54a8dff58c3

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogOEmmFVcqq0GnDZT:VK7DDeKlogOEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0
    .elf linux x86