General

  • Target

    4be4d672f2b969a5e06fa7526060555c89a3a79030237f8d44c52c35c15c7f63

  • Size

    89KB

  • MD5

    e08f1f2094f657229e86859f4f6bbe9b

  • SHA1

    c1ab76a08c3bce0bb2337b8cf55d90c8a9ddbc31

  • SHA256

    4be4d672f2b969a5e06fa7526060555c89a3a79030237f8d44c52c35c15c7f63

  • SHA512

    6180a10ec5f288507471fbb4876e73e7e01fee683dba9ae624d8692a35db59a3d6a4dc07823e6283f6314c8e979d52a415e02c7046a1283c74b2671bdb16d624

  • SSDEEP

    1536:WJ8423LJOxYRQzdmbWzKWQC8jIOlfPUEikuIW5hN9aEGTWshe0QzUzJYQ2Wk:o2QxYRQRuq98jIOFPUEup5hN9atWUe0e

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4be4d672f2b969a5e06fa7526060555c89a3a79030237f8d44c52c35c15c7f63
    .elf linux x86