General

  • Target

    4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c

  • Size

    122KB

  • MD5

    58942045be290045ccce23385558b743

  • SHA1

    840dcccabfcb3959e1d7d9af763f37df9b0be8c6

  • SHA256

    4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c

  • SHA512

    d183059d3eba297ddbd3b7037955a7ea56bdbba3aa12799413e4b09393784e57f8863c17aa882c0c04e44240548cdebf75633da2ce78497a820f2e9992b97878

  • SSDEEP

    3072:9QViZwVPs9u4vM9+NS+etJ8add9QzTsqzXHt4NKcXeGcgqGK:9BqUtUSS+etJ8addQ7Xt4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c
    .elf linux x86