General

  • Target

    4d2dbe8b190dbd86f1f0bcca3a5f0d7cb5f0af0e0d70237f319113402e5705fb

  • Size

    148KB

  • MD5

    f54d0a8616d97f3912adf16c75006d10

  • SHA1

    04806a03701a74e2c721bc0c409d90a1d161b329

  • SHA256

    4d2dbe8b190dbd86f1f0bcca3a5f0d7cb5f0af0e0d70237f319113402e5705fb

  • SHA512

    166c6f7bd6a46c0cfb9468d410ed32d576488c1cc9512031cb5a08d36f24cde4dfc57042af5dd1a1ac6d5aad571f80fe199e804222a6b8f93ba7b282e3d7f4bc

  • SSDEEP

    3072:HE9rx5elUUrxUVVpSE8JqMrOltGDalhWpRwWriH90PfNatph1:MxPaEx9MilSesiH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4d2dbe8b190dbd86f1f0bcca3a5f0d7cb5f0af0e0d70237f319113402e5705fb
    .elf linux x86