General

  • Target

    47d3557ccf345018f439c18fc0b142505826a87e209f17d50f7b47e02c636484

  • Size

    97KB

  • MD5

    6e3967aaba268793dd4200a2310aa412

  • SHA1

    21bc63cc20438b4e9ec6d033b5d0ae1d6c2acaf9

  • SHA256

    47d3557ccf345018f439c18fc0b142505826a87e209f17d50f7b47e02c636484

  • SHA512

    e4a7101bcb61375180125db07cb6595c642fce1d911fe073d6366ea39bce1d477044d98b19071f51cfde114e4f0607cd5bce8f43bf923ff34cd8dfb69ab31110

  • SSDEEP

    3072:TbkXiYUFB+nPvpqHSdDIp5huOWiYy0Oz/FQQ6uN:9Y8EE4cp5huOWiYy0Oz/FQQ6uN

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 47d3557ccf345018f439c18fc0b142505826a87e209f17d50f7b47e02c636484
    .elf linux x86