General

  • Target

    5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc

  • Size

    111KB

  • MD5

    a684550231cbd0ca99f9edd9a24b4ad2

  • SHA1

    753e48f8212247ef770d05c267ffc76fecc66564

  • SHA256

    5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc

  • SHA512

    7b2fe3b66d7af2454a726e014f93f409b9c8b329e0ff6cfa7929da3455cb9064ba41bfd47d50ae260d2b5a78451db2c31c7453e5683cf96a9ac79f96849bb2ca

  • SSDEEP

    3072:8Y0DRYUKG9JzVv3btiS/QjzWWZHmqKScqqvWnfme:8YLQ9zDZQjz3ZHmqKScqqvWnfme

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5a67328f3b0d191f22e0f65fba08156b886fdd45acf4b28f74e0b78c8878b2bc
    .elf linux x86