General

  • Target

    4f25bea5b185cf7cfa06ced0c7c62f1907dda1782773f5b8e71a2838a973aa29

  • Size

    97KB

  • MD5

    c0f1ad2b167a611f187ca33dd5b11d14

  • SHA1

    13aa1bffaa41e24a6cd1c4b3c7327a823423b15d

  • SHA256

    4f25bea5b185cf7cfa06ced0c7c62f1907dda1782773f5b8e71a2838a973aa29

  • SHA512

    1ee330107b9f95e248069f8acd32855d9cfd8733ef6cc97a40fe47b8a8bd27cdda92794a1905673f4fa57fd7d546a9142732cc3be3949abe7bf05628fde64df8

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogAEmmFVcqq0GnDZT:VK7DDeKlogAEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4f25bea5b185cf7cfa06ced0c7c62f1907dda1782773f5b8e71a2838a973aa29
    .elf linux x86