General

  • Target

    4448d59c6b87130715d59356e5dd60e804113b384109cb76e608b6c3f8b04f84

  • Size

    130KB

  • MD5

    684da25dca898346483bc39361ec0872

  • SHA1

    16799d78ba3dc3cf54dc51d0f6552eff6f870b6c

  • SHA256

    4448d59c6b87130715d59356e5dd60e804113b384109cb76e608b6c3f8b04f84

  • SHA512

    7b4637178637d158315227d9574b62317a09b6c4d21363d2bd51a12f19466c44aba83c1a643cbc3689f485056acd38709722fd0db8d901eeba3156b9f70c2a28

  • SSDEEP

    3072:U2e9im08Yzo9NU8q4aAIyliv2R29bROLxn/a49Bmq0ichYyeaK0TU:U2eL0WrdNH50/CLxnjBmq0ichYyeaK0Q

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4448d59c6b87130715d59356e5dd60e804113b384109cb76e608b6c3f8b04f84
    .elf linux x86