General

  • Target

    466f639f61bcb285d8ed3fc5c65924e624372304d7b0161f2ac9deb319f3c313

  • Size

    97KB

  • MD5

    a933bbfdaf9afd34d170ae4b3b5e850b

  • SHA1

    1a0771228ca6288d16944bfd89716d43b5ace672

  • SHA256

    466f639f61bcb285d8ed3fc5c65924e624372304d7b0161f2ac9deb319f3c313

  • SHA512

    a66e0a4433fe6092de9532dfbdead6cc4444574b6745f43328ed9a64b2cd3725846638af47e6ff054aaccf54f0291c0178c38906e2bea2d3a16392161e842f28

  • SSDEEP

    3072:Jg4eodUWUh917j8mc2deiPUDAZURyPfZ5hQTSvxinf0OzTyoQQub:JdRu917j8mc2H5Z5PB5h8cxinf0OzTyv

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 466f639f61bcb285d8ed3fc5c65924e624372304d7b0161f2ac9deb319f3c313
    .elf linux x86