General

  • Target

    4ca70302a79feccf6ff6d4e0fd98ac8263264d06d7e9c851a976411919f0d756

  • Size

    153KB

  • MD5

    0baba16671e71ad95a8537190cc2cba7

  • SHA1

    3b103c2fed55b2ac207ee7daef60c571b561ac68

  • SHA256

    4ca70302a79feccf6ff6d4e0fd98ac8263264d06d7e9c851a976411919f0d756

  • SHA512

    8ba66a30c7ba3e61dc4ddbea51077e454312dc7015210a39b6838af4365ce4ebc38be223182634e1600653d2227a6fdb31e066e654b489cd7fe7a310710631c0

  • SSDEEP

    3072:tT9q05nNrQX1qNpd+Me7wCUhbOlV51QcHbxhY/XH90PfNatph1:tBq0TNe0CUhSlVQcHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4ca70302a79feccf6ff6d4e0fd98ac8263264d06d7e9c851a976411919f0d756
    .elf linux x86