General

  • Target

    4168e60fda0a1ab35e03a55688aa005bb96181cac1ca5471d9013d0375600a71

  • Size

    89KB

  • MD5

    fa4dfca7a2ec3dd2ce40fca98012a88f

  • SHA1

    3ec49675e0bc29bbe5bbab8d2805308642f293d3

  • SHA256

    4168e60fda0a1ab35e03a55688aa005bb96181cac1ca5471d9013d0375600a71

  • SHA512

    4ecf7438b797074f1fb02439e1b644fe672f0af5a24f0c4b3a82290e3e270ea78c8a74e2e4aab80d1212ab2991df3d7293186c8520ad0aff5409b49acce29939

  • SSDEEP

    1536:2bcSA3zJO93RceGQwqWQC1yIZ2DN1d3Oon5hBayrJs6Wshe0QzUzJYQ2Wk:kAI93RceGT91yIZ2DN1Q45hBaqWUe0Ql

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4168e60fda0a1ab35e03a55688aa005bb96181cac1ca5471d9013d0375600a71
    .elf linux x86