General

  • Target

    4d4f5977e64c427ae54d6593517b757cb3ea99826a8f5da4418f8cc14a2fff50

  • Size

    109KB

  • MD5

    91a33cf58ed899057876e80b1e083854

  • SHA1

    d909b6bf72193cb7ed92d1f98d4d7184b039cd1a

  • SHA256

    4d4f5977e64c427ae54d6593517b757cb3ea99826a8f5da4418f8cc14a2fff50

  • SHA512

    7c4758fcf1b7e0a9bbe21077028f431402e1a7bb23a6590be3a3b96cdb85502104fd5d18a70b8c7b339af1acf3de3f9c9e6edaffbac26ffff90c54e5c0cffa43

  • SSDEEP

    3072:nz1ARlo95Uzrw90lb9sLx+mGhQdn8Jgdml05chS3Zam1n:nz1N2rA0JE08dn8edml05chS3Zam1n

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4d4f5977e64c427ae54d6593517b757cb3ea99826a8f5da4418f8cc14a2fff50
    .elf linux x86