General

  • Target

    519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6

  • Size

    148KB

  • MD5

    57105a071448eceeaff91782664a9bf8

  • SHA1

    6a486d409cd68661d5acc6d46fe07c1241dc1469

  • SHA256

    519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6

  • SHA512

    bbf548539bc2219748bef79da6cefd2c56cbf7448ffeb10e453ea302f8886c714201bacf193137eef5b4d2570fd77d812744cb58f631441738c0bb4a38a24302

  • SSDEEP

    3072:H6pvTqTmdNUfle11pZkpJqRGOlVGiPlh2vpupRwWriH90PfNatph1:qTqYmGECRFlrdgvpSiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6
    .elf linux x86