General

  • Target

    4d4401ece1a00e9d00f1759036135ed9532a3b803b07b0d7541dd742ff1ba337

  • Size

    97KB

  • MD5

    4c1a94213b8f309546b011492c8efa24

  • SHA1

    7967cdfd20afa50d6af2a63141cad95f2fd7256d

  • SHA256

    4d4401ece1a00e9d00f1759036135ed9532a3b803b07b0d7541dd742ff1ba337

  • SHA512

    a07c81c50790832c4d7706e5de22e6cc053b5d1551a209c6e82b047af4d6dac8c561f76ee85d4f59d93cee86a4f7cf677b629cc6151c7151c53e2a2c716d7ff5

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQogGEmmFVcqq0GnDZT:VK7DDeKlogGEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4d4401ece1a00e9d00f1759036135ed9532a3b803b07b0d7541dd742ff1ba337
    .elf linux x86