General

  • Target

    59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7

  • Size

    116KB

  • MD5

    c55c55bd7eef002b847e5cf97d593113

  • SHA1

    a9479e933fec9409669d8629f299bd870a0376f7

  • SHA256

    59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7

  • SHA512

    5c10563eeb32c1a1684230aa1d72dcb52093b58f6fec2cadadd39738ac39cb2fc0e0189fe2359feb9007f2801846c1dfdf1e7f5e36b3f2f9e9fdf256f7407d89

  • SSDEEP

    3072:lGR1eOtJ8AAWS8oJMetJ8au49QuTsJk0nJ3VgXBtcZkG7gyqc:loyxIoJMetJ8au4lak0JlgXBtcZn7gyv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7
    .elf linux x86