General

  • Target

    564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f

  • Size

    153KB

  • MD5

    02baa25a55e919eacaab3e26cf7538dd

  • SHA1

    e3b7dc77deddc8a9a83aed898fb9407ccd537c04

  • SHA256

    564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f

  • SHA512

    4d62a0502eeb197687261d3e159b5c483b144e5b6a06c0a2c6b05fb80d0618932fb08d746d4f2a08cc55db08860c028955c2385c80b5032cfdb0a20daa8ac85c

  • SSDEEP

    3072:lYRcF+x52xW1TVONYstKZSgBFOlt5MijsLR50+XH90PfNatph1:lTF+qT+SgBMlEijs95xXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 564fbc074a86bedcb3482683e1506d4f797c9ad260d53c2915e28dcfc5b3849f
    .elf linux x86