General

  • Target

    4889130d070121e0ee29838ee38ff79933ae74680b8cde11f35538fb3e856e66

  • Size

    115KB

  • MD5

    6ad0aa5378bef952fb68be4c22acda16

  • SHA1

    d124b565d529afeed99f898ea8581c02611677fd

  • SHA256

    4889130d070121e0ee29838ee38ff79933ae74680b8cde11f35538fb3e856e66

  • SHA512

    842309728e52eaed51e12d03d09a9621414f3368acdaebc90762bf2a6fa7aa2b157901ebac196ac5d0847709006761ae74885abd8c63f2ed743d245649e62d3c

  • SSDEEP

    3072:yM4JAlTxM7ZNvVafgGetJ8au49QuTseCz38bVS+Il1iUnnl:yR5ZrafPetJ8au4lFCz38bVS+Il1iUnl

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4889130d070121e0ee29838ee38ff79933ae74680b8cde11f35538fb3e856e66
    .elf linux x86