General

  • Target

    x-3.2-.SNOOPY

  • Size

    72KB

  • MD5

    ca34f09d0fe8bd0dddd1443e401781d7

  • SHA1

    da043d55a48b11f1c0b47b38bd2bb279454a3ac4

  • SHA256

    3d4c4cc860a146597b5830fa4e4c5ab9a5eb32304bd88a9e6256452740998727

  • SHA512

    de5af8be9508268a2c25efb73f0841b068224c80b492f67e271a0e808ae9b15a98e4d22c844fce2b69701db5ff94474e710377b008b71447d23b3489e20a1d2f

  • SSDEEP

    1536:nm+c5osQWiKLoxKFn6pD+OTxzMvMmLI2VOCjXUfJRk:45omr0xKFn6J+OkMmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • x-3.2-.SNOOPY
    .elf linux x86