General

  • Target

    4373a73c032df4e869879f464b67a8530a69a8f03cecfb90ec7f23e6d2e1cf09

  • Size

    85KB

  • MD5

    e018c7bf26fb14435c5285d69cf2b7e4

  • SHA1

    10fb116f7c37a933e02647af4d791a0f228e6d82

  • SHA256

    4373a73c032df4e869879f464b67a8530a69a8f03cecfb90ec7f23e6d2e1cf09

  • SHA512

    028f35490a1487d23f02b0a1497b528a00a9c4ef1aaee4d9206e2081480b36ba93d8cb3ca8e0cc0c1f4702cdcce1cbcf837ddc7c23dba37ba1a7eeaabb9b18f2

  • SSDEEP

    1536:EmzsTEtU8UGULM00SCRtsHWA5TKYBiE/FaLnY5h6v+fd9mYImkgoVGNcRJS:Emzs4tU8UGULM0FCRIWA5WIiE9dYvW9F

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4373a73c032df4e869879f464b67a8530a69a8f03cecfb90ec7f23e6d2e1cf09
    .elf linux x86