General

  • Target

    42141a797b08fba8540b0266dc975e35b78945fdf8530f4253dfe4d8f24d727f

  • Size

    143KB

  • MD5

    b9c86d4028c9541845ce40488ce5cc0a

  • SHA1

    e8cb86ba042838d1b1a45ae107619ce3ac49ae87

  • SHA256

    42141a797b08fba8540b0266dc975e35b78945fdf8530f4253dfe4d8f24d727f

  • SHA512

    0f786a3c2847097e155aba7b406995a8532df7b5d187c5e124db3f3cc11f839a8f249e774c07e2ae18c7d2f2290f05e67d29fd50243231f594b5e48ac72f3425

  • SSDEEP

    3072:WN64nXXxXS2G15PWsWUjMhE3e2vjco8O6XH90PcZsatph1:WHnnc2EjgE3e2vjD6XH90PcZsatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 42141a797b08fba8540b0266dc975e35b78945fdf8530f4253dfe4d8f24d727f
    .elf linux x86