General

  • Target

    c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459

  • Size

    101KB

  • MD5

    a967b2b3931cc4f6239b95926438997f

  • SHA1

    45e0e4a967096966a87a81cebd5bca92d6a62bcb

  • SHA256

    c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459

  • SHA512

    bd781cb6f2544301835d718bebc4d4936c5835da19a1aa21adf0a81ef464478a8f40121c49a34691e2c971ac32a761769ddd1a7fe287cfa6eddb24e881eae99d

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fCHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fCHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c33f15d2abbbfbc815d05063734148169de2c5f371114ad4a8419f53886df459
    .elf linux x86