General

  • Target

    519abf1f66a2af9ce397c468d9567def7348ce7c121ebdc138c86f7d5b6ecf63

  • Size

    148KB

  • MD5

    5014e428ef03550ef08d7b190b03daee

  • SHA1

    dfc4c73cef761f68dd0671f8deb32ae7fa7356db

  • SHA256

    519abf1f66a2af9ce397c468d9567def7348ce7c121ebdc138c86f7d5b6ecf63

  • SHA512

    792afb75c394fe3895dc91a8597a3bab4ed6ca8b7b7c3234830039280b94a7b751d5242b5c7dc0e52a68c266466d7220d95aa4078b9f0f8ba99a24f1ba691f38

  • SSDEEP

    3072:HM9zfGttU1le11pZkpJqRfOltG7PlhhlpRwWriH90PfNatph1:4kAGECRWlad3iH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 519abf1f66a2af9ce397c468d9567def7348ce7c121ebdc138c86f7d5b6ecf63
    .elf linux x86