General

  • Target

    48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6

  • Size

    122KB

  • MD5

    a3c16fbcdefedfe9285e4211ca3c258a

  • SHA1

    2efc6d85dca687e391851ecc18cb7528f8b3d764

  • SHA256

    48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6

  • SHA512

    5567ff6b8ffe12a7b1f92cbced96c0ed25adaf5841fa9a4a41345d521210299c6e63cb33a2152f654a5d1bdd754410f7e527fbfe3871211bcc90ce4db701c865

  • SSDEEP

    3072:JmwOYwWShDYu4vlU3NSKetJ8add9QzTsXzb0t4NKcXeGcgqGK:JzZgoi9SKetJ8addQUIt4NKcXdcgqGK

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 48c7072b35f5d0a253917ae17d3808f466bcb3e1d375ce30b0d63d5a43bd2ba6
    .elf linux x86