General

  • Target

    b4fb19be4508a9d425afad9553cea560a5749484b568b79f523e51796ea4b4a1

  • Size

    111KB

  • MD5

    627ebbdbdc08bf3bed7fc9891da85650

  • SHA1

    de0520082ef299863a10483f889e83f59de9188c

  • SHA256

    b4fb19be4508a9d425afad9553cea560a5749484b568b79f523e51796ea4b4a1

  • SHA512

    ec8bad071d8f987ef981da8605277236e42bd32dc6ee091ef018392735ccd4127257bcddd6592df20bfa59aee1edc1a696491a67b7d66499f7c60dc6dd3a8ead

  • SSDEEP

    3072:AQ6I+QUBC95JiC7LvL2JhMWuefYfkEdmqKkcLJSYnLj9:AQn95sCCIIYf7mqKkcLJSYnLj9

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • b4fb19be4508a9d425afad9553cea560a5749484b568b79f523e51796ea4b4a1
    .elf linux x86