General

  • Target

    458b088b0c7ffdc5a1c9613a73e7a362127ffa1842fb9bbab00078e03409af9d

  • Size

    129KB

  • MD5

    c0b551391e7ce245aee24d68c5e2a318

  • SHA1

    e74e1fa79dfc8246adbc586e5fd995ea1863f922

  • SHA256

    458b088b0c7ffdc5a1c9613a73e7a362127ffa1842fb9bbab00078e03409af9d

  • SHA512

    5ec24fa0b01348faf80950b4709ecbba4b4bd92e44b21085989cde6df03f272acccf13baf509764ed168752602deb9e0850f3a13bfa6fc333e4daec9af221c7a

  • SSDEEP

    3072:HAIBN+Y4jFpy+Y6w93a/gANxgYmqlCchYn3adpuj:HAaJuFLNxgYmqlCchYn3adpuj

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 458b088b0c7ffdc5a1c9613a73e7a362127ffa1842fb9bbab00078e03409af9d
    .elf linux x86