General

  • Target

    02a430a3f464e8552d2378057de521f4

  • Size

    97KB

  • MD5

    02a430a3f464e8552d2378057de521f4

  • SHA1

    1e585845aae32792fb11e655f34079866b92d417

  • SHA256

    6abf7ac5c3741fafeffa1ffdf85004fcd2138b42a096f3b7ae2db41da0b54fd1

  • SHA512

    c52f2631b682525afbce28d060e14b1d56de8a0a8bddcd529f17ebf3ccafdd1fe3010a00f3f62312f824954995eaa1f0db94b380090d8d982cf72253e0816f15

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogaEmmFVcqq0GnDZT:VK7DDeKlogaEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 02a430a3f464e8552d2378057de521f4
    .elf linux x86