General

  • Target

    4b323cf54428b4241b2334e552568603a828584da989a6af7bf6b27c34c7d489

  • Size

    153KB

  • MD5

    b8f8f73a04e1d48e93b3fa74f80d31b7

  • SHA1

    d099d50554520dd74e28ffd34cc99d903c888b33

  • SHA256

    4b323cf54428b4241b2334e552568603a828584da989a6af7bf6b27c34c7d489

  • SHA512

    60ae80811eeb02d003629a4320d982e9ff976085c7d0fad7fe687f5ce3077f4e8b3e8373ef424b1e41fa00422d91e953b05dd1b32ecccef3fbdd6e6e99633366

  • SSDEEP

    3072:Rk+6JyrBLrQX1qNpd+Me7wCUhCOlt5lkHbxhY/XH90PfNatph1:RHoyxNe0CUhhltkHNhkXH90PfNatph1

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b323cf54428b4241b2334e552568603a828584da989a6af7bf6b27c34c7d489
    .elf linux x86