General

  • Target

    4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8

  • Size

    153KB

  • MD5

    1cb073acd57fef9b4cc5f454bf5a0bcd

  • SHA1

    7aea56ae52bf9f897a10092dc25cf2b6956294a4

  • SHA256

    4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8

  • SHA512

    1ba212de60c3eeff149472f413646d2e7d9956fd78f8769a765915cc7d505a0edbd505aa53e381bef99ea0403eeba26aeb4aa6b97f2a31f448e749e480ef6c3a

  • SSDEEP

    3072:x5V27AY5DrQX1qNpd+Me7wCUhsOlt511HbxhY/XH90PfNatph1:xX27PNe0CUhzl91HNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8
    .elf linux x86