General

  • Target

    pty4

  • Size

    90KB

  • MD5

    60f50372901a3ab6be093cb9922fd75c

  • SHA1

    03fabbbc736a5c59b889e3675331c96263d4a4a6

  • SHA256

    16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2

  • SHA512

    480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b

  • SSDEEP

    1536:pe0MIyLxo/d9zL+dQc55mOVUcfkmWSVPOZ5RGG2FNVMIzJLayLaI:p3y+/d9fSQmmlcfNWS9650lGQYV

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Identified Kaiten Bot 1 IoCs
  • Kaiten family
  • Mirai family
  • Mirai_x86corona family

Files

  • pty4
    .elf linux x86