General

  • Target

    4876d0bf6aa8a992aa3d0e8924cfa428

  • Size

    97KB

  • MD5

    4876d0bf6aa8a992aa3d0e8924cfa428

  • SHA1

    2f8e8a31d12878e1d3caf49231dd348924b0786d

  • SHA256

    34681b0b2e9ebe601110e9618e1b92484bf09c540c08d988edb8400d013ae0a6

  • SHA512

    a96599d4faf525f862a5d93e72e7c863f89a82860ea5f127a76dc7e52114988cbeceedd49e65906ac0554ecec87c2d39bd8c069ed52c236cd830d923d5e46361

  • SSDEEP

    3072:uLOqjPQP39VjGWX98732V7kGyNVQ5huT87FXnf0OzTyoQQub:uJQP39VjGWXW9NVQ5hueFXnf0OzTyoQ7

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4876d0bf6aa8a992aa3d0e8924cfa428
    .elf linux x86