General

  • Target

    c358f6e8893c5fbaf3a733f4648cc677

  • Size

    113KB

  • MD5

    c358f6e8893c5fbaf3a733f4648cc677

  • SHA1

    435e32b2a7c914beb5887220e50689847879d76f

  • SHA256

    8a5b47949e119f41d0bd0eba2f882ffe4340a79094f646da2e874ded8ed5ac9e

  • SHA512

    dabca078b2ff47d88b319ce6d61d5c88ba2844b5d701a28bd35163598a2936ddefd9ed19c584b6f52d919dcfd56b0dd8e9c2a3f95c85719a6d49699c3a061b9e

  • SSDEEP

    3072:j98HdmPaFGq5PBSVjDW6iw7qLQ68E97JEXPk7fD162TVntJ9jsEmST0nYXbg1DE:juH8+5PBSVjDW6XNu1EXPOfD162vfsEL

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c358f6e8893c5fbaf3a733f4648cc677
    .elf linux x86