General

  • Target

    510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b

  • Size

    98KB

  • MD5

    3d371e091875ac8079f29082f573310c

  • SHA1

    cff2d41f280d7ac4d58e52782da891c951d43aea

  • SHA256

    510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b

  • SHA512

    75b8fae64cba6e66caedb952ea2cc053b0f04ecefd0086fda714c2da4b329d18744d01fa573f981f154535f3113dae4ce63b8f7a9f9d311c74a407b1e118ae28

  • SSDEEP

    3072:c3dKrphSeJs8vmuCI5Upfd9nHm4KKcXuGggYBK:en4JxCgUdHm4KKcXNggYBK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b
    .elf linux x86