General

  • Target

    d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c

  • Size

    101KB

  • MD5

    3712acd190f821298a7d05a67e691a68

  • SHA1

    d3aa6cea07a2cd4f0d1a10348d89d6261bbe8c60

  • SHA256

    d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c

  • SHA512

    a5041b8572c551ba35d87984201e88ad83ad0accc6226843c734ec8a2b47c7de092eacf13a8cd6952e86b62e3a93d1d3fb8186f130a76b91394fa09e5a43b412

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fDHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fDHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • d3e4c8cdba817d017c2d41a0a4042fb4a725958cca28a92b6bec6f454834860c
    .elf linux x86