General

  • Target

    4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1

  • Size

    115KB

  • MD5

    83927671ee342ff9122c962c667da23e

  • SHA1

    2695f1a0c73a810b9d24ab035361be45d0011bf0

  • SHA256

    4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1

  • SHA512

    b29f3409b93fd7879b556e8704a57e86efc9477203db42964954f9fced0d0e2319ffa1317bad8089ca1d1f7c816237b06a67796fe25b86ed9d22ffd4fb2246ee

  • SSDEEP

    3072:yM4JAsTxM7ZNvVafgGetJ8au49QuTsbez3mbVS+Il1iUnnl:yRQZrafPetJ8au4lcez3mbVS+Il1iUnl

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1
    .elf linux x86