General

  • Target

    47562e4b4f2fa3ec025d44c3b8f5ea6d0f6315427ef4a49d290e1c66881a6f75

  • Size

    98KB

  • MD5

    b7ae39eb3845ad90c4d76d11f8ea753f

  • SHA1

    0eaf097351c2ae819b353814088987cf58928f9f

  • SHA256

    47562e4b4f2fa3ec025d44c3b8f5ea6d0f6315427ef4a49d290e1c66881a6f75

  • SHA512

    048b89fdf7ea84eb8d77e7e9eb0e3058099f6faa39e5f0961b8bdb9fc02a1647be72cade9ea859dafbf7d40e39de7f4b3f68fd38f4421d051f53d7be71e871bb

  • SSDEEP

    3072:he7EqeQUHfPyjRJ9rBFKqecF1QmqoVcqq6GnQOT:heZyo5KqecPQmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 47562e4b4f2fa3ec025d44c3b8f5ea6d0f6315427ef4a49d290e1c66881a6f75
    .elf linux x86