General

  • Target

    58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b

  • Size

    98KB

  • MD5

    1459f8cc58d6b5c3ad95c0221f6c9c70

  • SHA1

    7678dcd81d177eb328c89f380374fb61d8d9ebe2

  • SHA256

    58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b

  • SHA512

    22d76080b4063940c9223749d9ea11b0c5e54ec5825eed5b05c41ece712a5f08124f0a98618d37001177b620112392b186c8e84636087275a01740e8d7a1f1ef

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqg6F1QmqoVcqq6GnQOT:heZyo5Kqg6PQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 58353b43aa32b4b76675bb5320f4e584a0d4fc5e9f095f7593d39ef75af7810b
    .elf linux x86