General

  • Target

    4070554ae3755dff4b31fcb633f9b0d179902c15786299b06cb292fcd905c0dd

  • Size

    93KB

  • MD5

    138c87bd0a27a70e8b4f4b58a83cc14e

  • SHA1

    fd06b4c8987f03c252f6e758e91e0dc3fba50679

  • SHA256

    4070554ae3755dff4b31fcb633f9b0d179902c15786299b06cb292fcd905c0dd

  • SHA512

    013fb301e3d010853ae49a0958f3c7c9c0f9cb749f1bdbb51c88b5f04925447d6c37180df39e0ca54844d4288a975fa6294f968bcbd935474f7a449dd3078913

  • SSDEEP

    1536:yY39lMYa+n63KAPNKyWQ6nRlEwscCnMCYeZALe5hESgW4kcmbPM37K8PN2UrYe:J9Ja+ndMNetnRpsJMCYeYe5hESJbE371

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4070554ae3755dff4b31fcb633f9b0d179902c15786299b06cb292fcd905c0dd
    .elf linux x86