General

  • Target

    4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643

  • Size

    164KB

  • MD5

    0df650b820b5ec576afd2063bf1ab94d

  • SHA1

    958d60a69e3e6aadf3f612bfc3cda0556aa78630

  • SHA256

    4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643

  • SHA512

    fa8c04cd10a3321cceb2668dbd1cc41be948098ca3638928fb69752e9440c1caef5aaa876757570f8737f9f203efd3eb814fa4abcafb78ccc36bc69fda08b356

  • SSDEEP

    3072:QtT6Jq7+TPDcVjQWsa4xA1iPlmTJNq8WbgDI0onDM0hsJmbeL4jDPY1yE/vHtsS:QQJBTPDcVjQWszCq8WUbon49mbeL4jDK

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643
    .elf linux x86