General

  • Target

    4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d

  • Size

    137KB

  • MD5

    2a532ac01fb5dd356cbefc2886eee9ca

  • SHA1

    46cfe0bede0a6bd7ae4b2a102a67a02560339b25

  • SHA256

    4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d

  • SHA512

    66e0e6e97a8b952bda8852b925a7f87a5df96b1fa7124299a005a642d15327816160b02149b5aac67187c472ab43d33be3f0c17ca4578a6f4362630c1d8209e2

  • SSDEEP

    3072:kFVA0rcebUWmXkKusiMfOEqF8+wBiDBda4giJHaEFk:kFVA0Bbm0xsjm3zwBiDBda4giJHaEFk

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d
    .elf linux x86