General

  • Target

    4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0

  • Size

    91KB

  • MD5

    1129fc87c01eab0106fdd61d849648dc

  • SHA1

    1d107b594dc88220a6b30cea62a33c57c2f206f8

  • SHA256

    4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0

  • SHA512

    8dfc31e8edef3b885a7ad6b8e247ddf79a28c91654a61f26f691767e2a3d029512ceb4c218fa7ab99daa8894fc303a84e4ca6d65dda8f08bad68e7b67b672333

  • SSDEEP

    1536:h9O91OMJcUeUN3NXahSkCWG3CeQoQcr9lh3aNXocX1WE7GUKAqsANOaKnD3L21MH:h9HM6UeUNtahSKG3jQoQsDh34voE7GUh

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0
    .elf linux x86