General

  • Target

    4b00a6583540fa94ec6fc99396aa2a44d276a04f547c58dc3ff4cf29efcc54f6

  • Size

    101KB

  • MD5

    1d08e77321756a40067647814a57c4cf

  • SHA1

    1951dbfb5425b1bb50406d02c1ea124a600c1861

  • SHA256

    4b00a6583540fa94ec6fc99396aa2a44d276a04f547c58dc3ff4cf29efcc54f6

  • SHA512

    f4876e69e7e300849ecf9d35e04d8cd2a5d3773bad7439d5262e95f90af6ffad874845cc13fff2bc681c5b509521c090ed6a8042b78e3288e74da8b2e0e4998b

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fNHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fNHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4b00a6583540fa94ec6fc99396aa2a44d276a04f547c58dc3ff4cf29efcc54f6
    .elf linux x86