General

  • Target

    c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d

  • Size

    124KB

  • MD5

    4d755623106c0b456e6346d7564a7c2c

  • SHA1

    c6444e84af12f408c19923ed110c63df0c3458fa

  • SHA256

    c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d

  • SHA512

    73865eb04d28f6e483df45f99dcf67fdc8254db1c9887cb9a9eab25610906e61de93f08c16b740c52c9ad26f9c1e879adb958bc5b15555e32ab2e6ce47aac8ac

  • SSDEEP

    3072:klRQb0fgTpzmtRhnebZo8w+VxUuMvsCxg5GVlD9oY4giAGaJpP:klRQb0fyzmtRJ8KrsCxg5ElD9oY4giAz

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c3a1dd2e31b7c8158f7fe24a59e0bda1c592322a26abf9a799f164ce453b653d
    .elf linux x86