General

  • Target

    c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a

  • Size

    101KB

  • MD5

    05ff04ac2dad49a4d2b17fa019b9a416

  • SHA1

    a5593c2f7d8c785ccac2e4bea888c929dc530224

  • SHA256

    c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a

  • SHA512

    48e65400df880661623997a9bd5757b66d18839e76bfd44df651ce3b066df6f422ffcc32d1f7ade48ccf70c3fe7812c70bfe129612ff1527b374009ea0ea55d8

  • SSDEEP

    3072:GK67bD77b6lVeSm0+HsopApASmB8VchtSgDj4:GVDR0+Hs2pSmB8VchtSgDj4

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a
    .elf linux x86