General

  • Target

    49665e4c1682c702bfd92b68ca65fdfb70dce5f590a7c1b3f389dcb753690052

  • Size

    130KB

  • MD5

    b3d1d0bbf215a50fc98b07c4f636a779

  • SHA1

    a86c6098d65f2ef24e6c58875df047d1ba2e8e58

  • SHA256

    49665e4c1682c702bfd92b68ca65fdfb70dce5f590a7c1b3f389dcb753690052

  • SHA512

    a7a7ecc068728f10fa41ccdee5ad24aacb4ddaa4b21d23589c43cbd503e6ae6804b13461ce42ccbe0eb1b0275df4fba07453bac4d2bf9e8df347bf5d9410507a

  • SSDEEP

    3072:qYGkTN5LLjhkMza1OZD9StCTetJ8add9QzTshT0bsg47KcX6GcgqBK:qYlTPu8LUtCTetJ8addQW3g47KcXJcgv

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 49665e4c1682c702bfd92b68ca65fdfb70dce5f590a7c1b3f389dcb753690052
    .elf linux x86