General

  • Target

    41dbc0a51ffa7f85affa5f44e337d3e24fa1955a442a25390f42803f230663b5

  • Size

    106KB

  • MD5

    82b366a73638f4ebef622bc377bfa3c4

  • SHA1

    4579d482e01e6028de2518842a8c7575ed0be316

  • SHA256

    41dbc0a51ffa7f85affa5f44e337d3e24fa1955a442a25390f42803f230663b5

  • SHA512

    f768b988989ed0df50cf39cca2129caf6999edd3c9453ab6de6e41332c39981af2656b67eefdcbf9c14daa36d94562e367e5acf255223dcdeba07561447e5f76

  • SSDEEP

    3072:DaD5O6WpUhDHznkPPNXZ5O1LRomqo4cqH2JnQ2T:DaDuyzzk9e1LRomqo4cqH2JnQ2T

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 41dbc0a51ffa7f85affa5f44e337d3e24fa1955a442a25390f42803f230663b5
    .elf linux x86