General

  • Target

    4949150af7680b4da92219d513b5f3b2861609e7b6e3c7f1bc61e65c238d2a02

  • Size

    101KB

  • MD5

    11c3e4927dd7eb512bdf3b8a4c414f35

  • SHA1

    588c3dd21360f441670e804b146cb5636f766043

  • SHA256

    4949150af7680b4da92219d513b5f3b2861609e7b6e3c7f1bc61e65c238d2a02

  • SHA512

    db601d0d1846d9f1971acd55ab88e8b40e04635a855c8d53558ef774fd434cf75a44d648d66edc2773b9a620db3f8ebc88dda807b9541219fe869b2281583e43

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4foFmmFVcqq0G27ZT:wJFv4Lm6AJ+4foFmmFVcqq0G27ZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4949150af7680b4da92219d513b5f3b2861609e7b6e3c7f1bc61e65c238d2a02
    .elf linux x86