General

  • Target

    dc3e7d5a581a21afb0b231b9b9c9ab7b030f149b048b294ae901b5cabeabdc10

  • Size

    85KB

  • MD5

    b8e7b133f0ec3dfa1a6aace16a49b105

  • SHA1

    94a32dc5663ad5cf77c4ec1d2e7275722efca751

  • SHA256

    dc3e7d5a581a21afb0b231b9b9c9ab7b030f149b048b294ae901b5cabeabdc10

  • SHA512

    0ec215af442476c3a79cd8f32db65067e5f0830862aec2449592f729c892658cf41db973cb53f762a8465d5424a5fdbaaf0222546a08889fec9c4c3bbb0df563

  • SSDEEP

    1536:D4vE4juf0Uz+bzu0ZloupkqBYlww9k4cgtAPHs5hSlsG7she0QzUzJYQ2Wk:cvznUSbK0Qup0wak4rh5hSh7Ue0QzUFU

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • dc3e7d5a581a21afb0b231b9b9c9ab7b030f149b048b294ae901b5cabeabdc10
    .elf linux x86