General

  • Target

    0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57

  • Size

    97KB

  • MD5

    62a9cd9306104d9526b6f0646532f4e3

  • SHA1

    40cfbe564ef43b1e14562704b571e75aaf1878bb

  • SHA256

    0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57

  • SHA512

    645a9ceac4a98d3bf248b7baf204a5c54cfe521ef80df81e3db605f231cbab29e24fec8248f829e9254be92537011a6612ba46e6c48321928ad9f82050e8395b

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogVqmmFVcqq0G27ZT:VK7DDeKlogVqmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57
    .elf linux x86