General

  • Target

    4331e6e0b26ffc98c6cde59290f2bf8813a3770e3916f72eb3a25b22179fac7a

  • Size

    111KB

  • MD5

    f33e992573f168ecec2fc159f25abe90

  • SHA1

    68031007516d67e06d5557ee7b7dae2c936bf99b

  • SHA256

    4331e6e0b26ffc98c6cde59290f2bf8813a3770e3916f72eb3a25b22179fac7a

  • SHA512

    a3d88116c97d721165560b6c52caa27d805205350e335900f05acfadc2efdc05f97abc96c1ff12bb32dc32b792b302a0f56ad036a8a257d8487eb1e6534e921e

  • SSDEEP

    3072:x4Ll3pUT4HasSXfMaJLyhlkO03p9DFor4gdcGa1A4:x4zWqaJvwhlkO03jDFor4gdcGa1A4

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4331e6e0b26ffc98c6cde59290f2bf8813a3770e3916f72eb3a25b22179fac7a
    .elf linux x86