General

  • Target

    4b0a6cf6efe323b1c37dd12e81570c56d23befecf837d4e3b9fbb0bda49818fb

  • Size

    102KB

  • MD5

    ad64ccb64bbb67d4f8e105ec8d2f8b78

  • SHA1

    5f5fd903b2252fb3673b783485e1bea95dde14a1

  • SHA256

    4b0a6cf6efe323b1c37dd12e81570c56d23befecf837d4e3b9fbb0bda49818fb

  • SHA512

    0964b8bd582d51cab5b50cb3aa0e58549c922816a489a5e4c879dc341721ac6c39f6c21c3197497976780960dc0619cfdcd7caf79ee1abae42c8a09c3eb1f82a

  • SSDEEP

    1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV9lq2S1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgajfswmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b0a6cf6efe323b1c37dd12e81570c56d23befecf837d4e3b9fbb0bda49818fb
    .elf linux x86