General

  • Target

    4b47022aa7c7976916a6a849526f4d49336f71393c88ce0d3afffa86993911db

  • Size

    88KB

  • MD5

    e6245b7ba166a6270190bc69d6abf097

  • SHA1

    6775941c381da8ebe95cb36be7bf9061b3492ff1

  • SHA256

    4b47022aa7c7976916a6a849526f4d49336f71393c88ce0d3afffa86993911db

  • SHA512

    f9d87dffe6274ba7858439a7526a86329f4526c7ecd6c1e4ce95af94e6434a4ac411e5314900f426e8366785368b635c2d5913afea9b3168dada8525a5b80725

  • SSDEEP

    1536:IYdUERs7U89gO9NnjYbKjYDI3YfDene889V9B4LaGPtm+Ig5rnm77XkcaP5VgYAB:ddu7U8939NnjYOY0YfDee86LB42AIg1M

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b47022aa7c7976916a6a849526f4d49336f71393c88ce0d3afffa86993911db
    .elf linux x86