General

  • Target

    i686

  • Size

    277KB

  • MD5

    c5903c5d6db926ae679250cf783207be

  • SHA1

    fe365aec3450af02b50609ae448d5159ce87c234

  • SHA256

    0ba46691b022e64889da216e0fb500a89cd440ecc1676a1530c4e16a433b6f2f

  • SHA512

    2a0d5d6a76bdbb73a250e3a954bb41827a9c0b8a02c59f6c891341f783be4afac09ae171372dc2686fea2ae0350e3fa1025e84403378bfac7c5e5b653fa9efcf

  • SSDEEP

    6144:IMNfNu0FAzYBNMXdZCSpn0UpQKqUgAZ08MjUlQQmmFVcqq0GnDZT:NNfNu/Mj2QQmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • i686
    .elf linux x86