General

  • Target

    46e56f4edbb40a6c94f4d80b9f3b77ad12e0efaff57329d0c5143d62f0073bc8

  • Size

    118KB

  • MD5

    deb20c0ddbd39828a27955e92d796ebe

  • SHA1

    61511b862341cdaa2f571e70e7c41fe904a29993

  • SHA256

    46e56f4edbb40a6c94f4d80b9f3b77ad12e0efaff57329d0c5143d62f0073bc8

  • SHA512

    f20146a9c66517ad5a5d7cf4720f70c0103775a649f4c21abfa107290db06160c556dc95d70b5b041dc3909e0dc21b63a1bf4c50482f96ee67f4d23380855f16

  • SSDEEP

    3072:H41bIKU3yrxVXI8LywLRefEtQ5KcKuLctdb:ob3UcvXIvWReMtQ5KcKuLctdb

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 46e56f4edbb40a6c94f4d80b9f3b77ad12e0efaff57329d0c5143d62f0073bc8
    .elf linux x86