General

  • Target

    424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8

  • Size

    79KB

  • MD5

    caf268636899543f8f97fa41a002772e

  • SHA1

    5cacccfc2bf1ea952ff5e407531816119b80b5ca

  • SHA256

    424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8

  • SHA512

    c72d11ca212b6fad0c1de19581918b8a299154323539ab3bf8935d91a6cf51dbdd7ae96743b34c8a52c7e8ad2fc831c45b1864bfe0547dd7cd1db82b532ac5bc

  • SSDEEP

    1536:BUyUJSLLxm98ujh2wMzPoO8/2XEsdYP1zOTDVpSm45hCTw7mmJ+4VTCjpMfPvB:BUyUgLFm98ujh2wyJ8/MEGYPNOO5hCT+

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8
    .elf linux x86