General

  • Target

    4ab0953442a097646be430c1b3ec38d7c27b4df122360ef0b75e5cc92870232d

  • Size

    91KB

  • MD5

    ed8a53fb1b64bc7b7dc4456a25055099

  • SHA1

    7b325e27787e1430dd93d25ef1be42731cba7c4f

  • SHA256

    4ab0953442a097646be430c1b3ec38d7c27b4df122360ef0b75e5cc92870232d

  • SHA512

    7e006755766e8d60ff0b334293604aebadf70dfe2dd2c34fd67606998b8466c2c874eefb0ceb44ca0407ce09eecc24b8b0993e496fcab5fea4515b07f4bf9e7d

  • SSDEEP

    1536:eDscWeYlJpUeUS7BDdL2CIrhepReNqDA+BIZQrmZZIZ0bJ85vx5v21Mh7ylLN2UE:eDgeYrpUeUS3LqrhsMosyIZRZcvDv2SN

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4ab0953442a097646be430c1b3ec38d7c27b4df122360ef0b75e5cc92870232d
    .elf linux x86