General

  • Target

    47f8745af5c34d05f3a3296009633dfff1142d2bf6a00b9f5eb8d58acb3e4732

  • Size

    80KB

  • MD5

    7878526834a645d55c4772b99c0209df

  • SHA1

    445fdbc7349b417da4221f1df3f375e6ac120ef3

  • SHA256

    47f8745af5c34d05f3a3296009633dfff1142d2bf6a00b9f5eb8d58acb3e4732

  • SHA512

    295175d94e184b8e1164e3ebc9f325540948d660db0d193b41ed61c2a2a03fd41093238c53da040e3b6509465e31ac6b6214d2ec5893fe589d37ebee3e50fc4c

  • SSDEEP

    1536:29nhOInUMU1U1UB1zGo5vr5e29swl4FoAo9bRN5mpANeiLZMgOljYbQReR:+n5nUMU1U1UB1N5vrT9sqKov5uoeidMU

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 47f8745af5c34d05f3a3296009633dfff1142d2bf6a00b9f5eb8d58acb3e4732
    .elf linux x86