General

  • Target

    54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b

  • Size

    89KB

  • MD5

    9bbe82a7e9db7a8d37b867a898acd263

  • SHA1

    39c50c59b8f19353933a1245eafeb54948a02acb

  • SHA256

    54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b

  • SHA512

    0abcadcc5c4d9112de274481286404fe4d2f98c888f26a9c39e70fd5baebafb2dc58cfaf3bfb6119a0318657e86456d8659b56c40c4a94ddbc0a23265e34d703

  • SSDEEP

    1536:KWMWNGsnm1UHtcuJX6/3PYUOXXtpdM35FIL6EQvetMatK0tc4POGEg0qc:JMcKUNlJy3PYnXdpOsL6Fvetx3tc4WG4

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 54d536536c98c67572eb012a840e55074ad85f066c29bb32d9b7b1b9c4fe143b
    .elf linux x86