General

  • Target

    49dda40d0e5812bda13926a3cf48a60e0ce150d9d047be07e07c901acb5f6831

  • Size

    89KB

  • MD5

    e02aadb9b6cdf28948962d563d034213

  • SHA1

    4170ecb018b64f2f19d89db044ac412ee2aa7725

  • SHA256

    49dda40d0e5812bda13926a3cf48a60e0ce150d9d047be07e07c901acb5f6831

  • SHA512

    6f45076e5f084adcb22e98955e209ae9cce41005281061d62d23e938d59fcff0029ee83e9c83ab906eb95e7b4af40f3b8e8468b9a94c5e6d327e7f31bbad6127

  • SSDEEP

    1536:2K2efx3YJOc+rDUdIwKWwMoyIZWoNE93uIC5hhO8rJs6Wshe0QzUzJYQ2Wk:Bx1c+rodrnoyIZWoNEQR5hhOsWUe0QzR

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 49dda40d0e5812bda13926a3cf48a60e0ce150d9d047be07e07c901acb5f6831
    .elf linux x86