General

  • Target

    57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb

  • Size

    124KB

  • MD5

    743acd28723eaa73a9358de859244000

  • SHA1

    2a246f20b5f894d70aad4400cab14703f78327dd

  • SHA256

    57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb

  • SHA512

    4a9e790f435cf74b9fe91a8813a79f878e77b750ae968c03ac5fe95723ddd5a536fb8fc4e7509d28157d61213ddaad85b6cfd971dc104cadd47a2a7b47f61042

  • SSDEEP

    3072:EXY5gzI24XRFnDjmoRcQeFxfusim3ZOZhzD9oY4giAGaJpP:EXY5BDXR9Jc5Om3ZObzD9oY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 57e9204e666d147c563be3494ccce172adc2880d3f8353669ab25d69cd2103cb
    .elf linux x86