General

  • Target

    57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96

  • Size

    112KB

  • MD5

    c5c86b472142cda05ec0b740f1d2e89d

  • SHA1

    5f45f28ea916b19b444e2927619587ec1690d917

  • SHA256

    57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96

  • SHA512

    d388969a28b8660736caa94096b20434e883dfbff836fff39a258414f8ea04788ef61dbae978823a153ccce8a54bb1574363cfdee072e015df5ad4f0087c8529

  • SSDEEP

    3072:LmA+U4tD8KPy2aE2MuUetJ8au49QuTszROHPMO2VS+Il1iUnnl:cpn9huUetJ8au4lY672VS+Il1iUnnl

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 57e11abb63cb27756163b7a4eb39f1a5f30e4e21c86277efa53af3df48636b96
    .elf linux x86