General

  • Target

    587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2

  • Size

    153KB

  • MD5

    702fed89086b45652ed3326466954234

  • SHA1

    3902f89134234c91172796cacac45f0c9d94df6c

  • SHA256

    587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2

  • SHA512

    bb4f84cedabeb90de61ffe9fb24ebcddcc5b1ab26e718fff0d2f8436b1611f68b9019dfd3d84c6c3a1706c53f6e7c3b94450ebffc2f00ee236839dd6ca888a14

  • SSDEEP

    3072:dP+JoERejZrQX1qNpd+Me7wCUh2OlV51KHbxhY/XH90PfNatph1:deoERKNe0CUh1lVKHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2
    .elf linux x86