General

  • Target

    4b43f10e8dc6de65c80bcb5c7f092fbc13558bda3f69edfd61f527b29fd37986

  • Size

    92KB

  • MD5

    921c0c952a0f410a62a96776c761cfc3

  • SHA1

    d4d2caf01a379bc3e32f3b53cb8a383fa67a533f

  • SHA256

    4b43f10e8dc6de65c80bcb5c7f092fbc13558bda3f69edfd61f527b29fd37986

  • SHA512

    380d58beed7d32eaf75e3e8936dd9c7a166c486e649a2f4bd14d6e16fc6f2755fe7299e39cb0513f71f992b1f07a080758268e9a4113bbf734c81039cc668628

  • SSDEEP

    1536:0yXDP3ZhUNUPXPKmYQaC/Qdk5cc/z4d7J2cNU5mZ5hyo7w882PM37K8PN2UrYe:vXj7UNUPX5YQJQdScc7M7JFp5hy4w88F

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b43f10e8dc6de65c80bcb5c7f092fbc13558bda3f69edfd61f527b29fd37986
    .elf linux x86