General

  • Target

    dc3c9bd0dae2d57435c7a64e7f791fde

  • Size

    78KB

  • MD5

    dc3c9bd0dae2d57435c7a64e7f791fde

  • SHA1

    328638e62f2f890745b3cf23c1b36ee51b5d0678

  • SHA256

    e681e08b104ed31986f541c9b2457b4f9fb068848387de047c5f427823c63b49

  • SHA512

    0d6bca479917e3a6dbb2a8679f52585130c7de749839072c6e977eaa5cbf618513ab54321a3c808d19a5567f37450e09f133f53381825a62322fb2561612b7cd

  • SSDEEP

    1536:zD6I8YheSwtcWesrwulT70X6xacmzjt5hBTnnkFXAbOmLIlVma6jtafmek:CI8YPw718U70XKaLJ5hBTn0XPmUlVmaC

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dc3c9bd0dae2d57435c7a64e7f791fde
    .elf linux x86