General

  • Target

    580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2

  • Size

    116KB

  • MD5

    b847ce1b8f35249bda3bb00d13ad80a1

  • SHA1

    e80ddea9b41bdc2d88b1fedc694e744d93249320

  • SHA256

    580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2

  • SHA512

    a3257f5cb3adf0d527e63ac63345295aa9f0e3b6e1f5ced94bf59865b0ccbf1356b750d17cf89d1ed719074537f2010b5cd84e056078f2770ad949c0161e589b

  • SSDEEP

    3072:zZdwUKUBV9+4fVTNv5j8setJ8au49QuTsiLKBn7otXBtcZkG7gyqc:UBo1N551etJ8au4lxSotXBtcZn7gyqc

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2
    .elf linux x86