General

  • Target

    460ce989b3e58869dff8d3772f0fa3ba78bb47fe0a05cb269f280cfe8de5bd7b

  • Size

    85KB

  • MD5

    3529b8c1399d1bb418720ca25e204582

  • SHA1

    2efbf531704844b3f207439dd1a49e5b5bc30d2b

  • SHA256

    460ce989b3e58869dff8d3772f0fa3ba78bb47fe0a05cb269f280cfe8de5bd7b

  • SHA512

    58b798aa7c9fdbdd242b47575f37f708fb0ce6e5e94186c38bb717ae2be7ea1a28c4d85da6a3b7ea12a76fc08ef16b28c32e4dd1d4116236797dff7468853a64

  • SSDEEP

    1536:R4TEc/UgccJUzMnrwDpIOvXceEQ9E3+MKA385hiU4+7she0QzUzJYQ2Wk:GTzUgRUIrwmOvseE6E31Y5hiu7Ue0QzR

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 460ce989b3e58869dff8d3772f0fa3ba78bb47fe0a05cb269f280cfe8de5bd7b
    .elf linux x86