General

  • Target

    5852defe23d05e2d5915572a137dbeeb51fecbf1782596f04db1c836462b0a2a

  • Size

    123KB

  • MD5

    ca0e79f2084ef3600ffb526d47b47c96

  • SHA1

    44f35466183f1f1d6ba544d7d19e80cbffccc210

  • SHA256

    5852defe23d05e2d5915572a137dbeeb51fecbf1782596f04db1c836462b0a2a

  • SHA512

    95033eead386fa9297dbf5bee4de7ef5714891fd323c34fe3ee217e3035c6ca5f156154cbd64fd513deea9b323d4579e43080d0d319ff82d5584a5fdc384b65c

  • SSDEEP

    3072:fp3vinvc7YMG/Fal6nWNgEFDsSq8mmqoYcqL/hnIT6:ftvivckqJ3DsSqxmqoYcqL/hnIT6

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5852defe23d05e2d5915572a137dbeeb51fecbf1782596f04db1c836462b0a2a
    .elf linux x86