General

  • Target

    55c60116aba4aec6da442c2f11a71a20f7466f94206eb76c047a1fe8b0385e62

  • Size

    148KB

  • MD5

    a3df4bbd06c864b607c3b1188c53d3b2

  • SHA1

    ea07cb85cad74de276470069e3f2109df2b8faf1

  • SHA256

    55c60116aba4aec6da442c2f11a71a20f7466f94206eb76c047a1fe8b0385e62

  • SHA512

    f44433f28ebd5e1806629811e993faeb776f27d5898c2b7083d365489ba55e96840973479dad67d5e7ac241a448ee5aeab47d3f90929fe885fc76c8bc2d965be

  • SSDEEP

    3072:H6pvTqTmdNUfle11pZkpJqRPOlVGiPlhSwqupRwWriH90PfNatph1:qTqYmGECRGlrdUwqSiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 55c60116aba4aec6da442c2f11a71a20f7466f94206eb76c047a1fe8b0385e62
    .elf linux x86