General

  • Target

    49a9fa9a633754fe5bd87a86363e7a4f692a06684e06f4929377c13e3fe60425

  • Size

    111KB

  • MD5

    bde8142239a9199f849ec35326ca10e2

  • SHA1

    e8aa1197c5634588a989e87ad58059069aac2231

  • SHA256

    49a9fa9a633754fe5bd87a86363e7a4f692a06684e06f4929377c13e3fe60425

  • SHA512

    dcd8e1a9512bd305993ddf957a4fe733656afe8d76fa4e1f9a6d8432e03c80a602ed66127eb0e52255eb80b962c7195ed0b80dc4e9d0b65da3dad5ee2d9e67dc

  • SSDEEP

    3072:sk2jYylW7Ang3gGWzw9Vyxn9HjlmqKkcLJSYnLj9:spv0GeRyxn9HJmqKkcLJSYnLj9

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 49a9fa9a633754fe5bd87a86363e7a4f692a06684e06f4929377c13e3fe60425
    .elf linux x86