General

  • Target

    41ac7084cf9293de13092829c95210dfbea50807a5797227affb8922fb29691a

  • Size

    101KB

  • MD5

    81a8901f2074f0df2ddf4c8426433f52

  • SHA1

    dec46cdaae9507094537a384bdcb5bc764de19a5

  • SHA256

    41ac7084cf9293de13092829c95210dfbea50807a5797227affb8922fb29691a

  • SHA512

    7d410f2053f87d079ce9f77491c8fed47c6df41d36d142108ddadf62f2043e1fe0e6c39a2e332e41154989ca4b53deebb0d8b5310c8779ef89b8237e7ba85cdb

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fkHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fkHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 41ac7084cf9293de13092829c95210dfbea50807a5797227affb8922fb29691a
    .elf linux x86