General

  • Target

    4bfec58834a1b902b1d0ebd02157a32fdb3dda66febfa5be96ac8a6141e2aeab

  • Size

    139KB

  • MD5

    191d1e9f1c54d1557a4fefc3986a7152

  • SHA1

    c0970b8c31da6099e2b9f52ce56300e197cf36d3

  • SHA256

    4bfec58834a1b902b1d0ebd02157a32fdb3dda66febfa5be96ac8a6141e2aeab

  • SHA512

    be21a372342b1bc1a5c19361a237c7158eb03ddf779353c308f417112c973dc376adf60ae58aed8a01b4a2b751a5a4f4dbf046b61c04aaf98cdeb3277e58f4ca

  • SSDEEP

    3072:/qGuqVIs8UrJuZcfQfx9/obmMVofJEMVpiH90PcZsatph1:b2mv+jobmMALiH90PcZsatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4bfec58834a1b902b1d0ebd02157a32fdb3dda66febfa5be96ac8a6141e2aeab
    .elf linux x86