General

  • Target

    40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736

  • Size

    148KB

  • MD5

    076619afb9da69bbeddb045d1dd15bab

  • SHA1

    ef824cd0ff3b019c6c666fa6b735b4c351479438

  • SHA256

    40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736

  • SHA512

    c55d44fcf3cda4dc35091d491fef909f845a222c6dba8fbbc9d7a703101eb5e21f719253d7086c056d858f633f9453462cfe724d5a24920f6e9c8000167f1cbf

  • SSDEEP

    3072:HE9rx5elUUrxUVVpSE8JqMuOltGDalhGpRwWriH90PfNatph1:MxPaEx9M9lSekiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736
    .elf linux x86