General

  • Target

    4209bca91799f714a03ecffa830c2dd0538235256b729d236359bac9ef576407

  • Size

    124KB

  • MD5

    9928d703d340ed5f92dc63f87cec3a2b

  • SHA1

    ed2ee5ea1988f88801c5ac01d3e338442c43a310

  • SHA256

    4209bca91799f714a03ecffa830c2dd0538235256b729d236359bac9ef576407

  • SHA512

    4f909eb480ec7bdfcfdbc908520e35b2939b12363020b0d704a574e90291585f6f65753c0684112554403969f304e77febd442b34a5fe201dc4c7bb7155e4307

  • SSDEEP

    3072:QbqCkOz3UoA0iCHWB+yGe6vTGhcDLoY4giAGaJpP:QbqCVpAj53IvTkcDLoY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4209bca91799f714a03ecffa830c2dd0538235256b729d236359bac9ef576407
    .elf linux x86