General

  • Target

    c544f0bfd32acf591d36da4c48362f2d0bc6b2849c4e659f8bcc77df0122c87a

  • Size

    91KB

  • MD5

    a7ee296a512b5aad7d7ecadffc7af216

  • SHA1

    31168f01b1268b72d9688bf99bf09fb300c22683

  • SHA256

    c544f0bfd32acf591d36da4c48362f2d0bc6b2849c4e659f8bcc77df0122c87a

  • SHA512

    736aeaeec4452514f2ce0b1c61eee912335bef649f29e1d696d73b0cddbcfc1137db3630014e24c1664bb3159960a642179938a9cfe4f74bc5a04f45a0e37e65

  • SSDEEP

    1536:h9O91OMJIUeUN3NCa0LUCWG3CeQoQcr9lh3aNXoci1WE7DUgl/hR/6S2F21Mh7yw:h9HMGUeUNEa0LaG3jQoQsDh346oE7DUd

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c544f0bfd32acf591d36da4c48362f2d0bc6b2849c4e659f8bcc77df0122c87a
    .elf linux x86