General

  • Target

    4283b2ccae62e62ffbae799333c6f932dcc5c1638885590a53689b3fa27d3563

  • Size

    102KB

  • MD5

    9bd49f59ec45e1dbbaefc68d2cf7b3d0

  • SHA1

    f78f28f5ffc027072663b53c230583f93dc742bc

  • SHA256

    4283b2ccae62e62ffbae799333c6f932dcc5c1638885590a53689b3fa27d3563

  • SHA512

    9a98632d5244166cc7696c9d360dc9b6aba09fefa12ff5e52f4ff5440516723de124e083a8aa69480bb3dad2f8fcc487e3a1e93cc536727dff0dfb8c3d3bfb3c

  • SSDEEP

    1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV97qvS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgaVSswmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4283b2ccae62e62ffbae799333c6f932dcc5c1638885590a53689b3fa27d3563
    .elf linux x86