General

  • Target

    57e247f8a4943743baadfda8d91afb386f1fb998bd7df21747345eb2ed00205e

  • Size

    111KB

  • MD5

    0e669218b0b49a70e967db17fd6c92e8

  • SHA1

    d006f91fbaa93ac0c7f55e2fcd1ea96e8f4fa032

  • SHA256

    57e247f8a4943743baadfda8d91afb386f1fb998bd7df21747345eb2ed00205e

  • SHA512

    c07ae13eb08c554d4955791a7c89fa82a65d711ed5684a80521b362269006308d5ae8a51061bdedb9f8110c3d7cc5225b595e44b461290f242008cffa9ed2e98

  • SSDEEP

    3072:zE5bf8R4LSG9TVGtDXgYizp6ID9oEAgqXMaaU4:zEB8sbGtDXg9D9oEAgqXMaaU4

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 57e247f8a4943743baadfda8d91afb386f1fb998bd7df21747345eb2ed00205e
    .elf linux x86