General

  • Target

    31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7

  • Size

    133KB

  • MD5

    df5b10b695b8a1fc03c2f6ce7dfe8d22

  • SHA1

    2238f343c603b4f8a2519d2a24029d105ff7b41f

  • SHA256

    31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7

  • SHA512

    a6311a81249e1e9a0606a0c647575277230ba4f3caaceffefcababfb6f23700128c876a938aa05ae9dde8832461a150bd5481f20704ad0f56fc1b488e3454a64

  • SSDEEP

    3072:3iztnQKV/UVAYmPUORYR6OZZAHhhMDf0V4gjQaa6GM:3it30AFvmlyhhMDf0V4gjQaa6GM

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 31ee294801b7a2ebb33b3b054ebf45f53d85479ba67eb1b46b621c6cf82704f7
    .elf linux x86