General

  • Target

    46879ca8d0e23e9a3e2f5959f0d56aac8898e1aa7e7ca92abeb196f9713c6a99

  • Size

    93KB

  • MD5

    f67d97480a05d37d57c422866620cacf

  • SHA1

    c04204809b0da8fbbd94e7028e3cb98692d09641

  • SHA256

    46879ca8d0e23e9a3e2f5959f0d56aac8898e1aa7e7ca92abeb196f9713c6a99

  • SHA512

    b353394a44411fb58c88a52f554792dba570d7578ad3d358dd34075c8066b82ef64f7bc9498ee7cbab5255e1e04474489e317cca717bbfc7d66f3e620870757f

  • SSDEEP

    1536:2mwGfhhIzDL5VrWGbWGKt/QFPYv/KDU7OclUCBD4a4LSb1Mh7yMLN2UcYV:04hIXL5BWbjt41sCDUr2CHKSbSh7yMJx

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 46879ca8d0e23e9a3e2f5959f0d56aac8898e1aa7e7ca92abeb196f9713c6a99
    .elf linux x86