General

  • Target

    f4ad2ebdc23a8db7d1d67c00fe311dcb3390cca15a9aea0996da6266469d70f0

  • Size

    93KB

  • MD5

    a45c55cbede25f30bf8843c0015abae0

  • SHA1

    39ee3a79d29c6113427724b27375075868097dd4

  • SHA256

    f4ad2ebdc23a8db7d1d67c00fe311dcb3390cca15a9aea0996da6266469d70f0

  • SHA512

    6f2e341ca723a94adf682cd905c93a2e85795592f48e8defd0cbd39ac5bb36bf60d8a541b0b40a6933ba0fd7a8b7512fd53da0d286cad64d5ca26b861ebee742

  • SSDEEP

    1536:yY39lMYa+n63KAPUKyWQ6nRlEwscCnMCYeZALe5hNpxrlLbPM37K8PN2UrYe:J9Ja+ndMUetnRpsJMCYeYe5hNNbE37KQ

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • f4ad2ebdc23a8db7d1d67c00fe311dcb3390cca15a9aea0996da6266469d70f0
    .elf linux x86