General

  • Target

    59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c

  • Size

    141KB

  • MD5

    caacd0e27bf93dd7f9bbeab72008dd2d

  • SHA1

    32254c10c6b4cdd20d7637a0b109749fccd55e98

  • SHA256

    59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c

  • SHA512

    46c9aba7b6ac2bae1d0882a7b367b3e64f8247fc0ca0f26baefb0bfb14821d8a6205fd083e89ee4900674bc981560f9b562b10198a504e2921d62277bdc52c14

  • SSDEEP

    3072:jWuDd5lTa3LXmi//5ABOzcU28Ca6jDF0bLD7da4giJHaEFk:jWuDd5QW/C4j50/D7da4giJHaEFk

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c
    .elf linux x86