General

  • Target

    4f4ac3c04a5b9c6fbedf1833ea7a4bb9ba788b2c82b86cfd072cd4436c81648a

  • Size

    101KB

  • MD5

    e5214441b1552107e14db956328ada19

  • SHA1

    d461ed8ce5b1faada0aeb53266aaaaf682914947

  • SHA256

    4f4ac3c04a5b9c6fbedf1833ea7a4bb9ba788b2c82b86cfd072cd4436c81648a

  • SHA512

    733f7688d4688be9173f8a65665c1d57a156a21d362ab8edf402cd5d2793203f974604bcbb8796949d3e923780eebf4247d37ca536e599e2df131b3ec95212d5

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4foHmmFVcqq0GnDZT:wJFv4Lm6AJ+4foHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4f4ac3c04a5b9c6fbedf1833ea7a4bb9ba788b2c82b86cfd072cd4436c81648a
    .elf linux x86