General

  • Target

    559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47

  • Size

    98KB

  • MD5

    373c1abcdb0958b3ec38e38c46eac696

  • SHA1

    38c2298d76d6e50817f0494373dd42e7b8260910

  • SHA256

    559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47

  • SHA512

    1ad6706094550c8fd3587b87eeadd765684008314d2b942b860a752daaff7c3656091ab018342c227b9ac899477c44dc3598cc3b32da9351c55eabf7a6d2fb6d

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqeVF1QmqoVcqq6GnQOT:heZyo5KqeVPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 559ad29168deb9eba283e453a48558a87c84e6280ff9b343693e2c83e1196e47
    .elf linux x86