General

  • Target

    47bf090919dbc5308950340b63b5e08a451c1082df5b6472d09157e5c542b0f9

  • Size

    111KB

  • MD5

    de4a871376e2b6136632b39fb3df27a1

  • SHA1

    bb3c72e5acc7c128fa481df41d65449efdcb0640

  • SHA256

    47bf090919dbc5308950340b63b5e08a451c1082df5b6472d09157e5c542b0f9

  • SHA512

    9589a5279ec64923376680b54c2b318ed5ff28085749280e976cb2058b8199fc4ebd6ab368fa1b8d35673f6962e53c0de46ecfcc49c0f8ea662b869a36292058

  • SSDEEP

    3072:lHOJppOhs/8jBQxuK/K+SGGmqKScqqvWnfme:lHkahFhK/KXBmqKScqqvWnfme

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 47bf090919dbc5308950340b63b5e08a451c1082df5b6472d09157e5c542b0f9
    .elf linux x86