General

  • Target

    4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e

  • Size

    113KB

  • MD5

    dfceb139ba6e426ac973d00a5d0bfd8b

  • SHA1

    2e51637894a1d961abdf3db8cadaad3ad8a57815

  • SHA256

    4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e

  • SHA512

    700a89dafce1739e69e02e67165ba68bf5974bac4d2e681c3e4147edef9c3c2c5775cddd8d2fb789bfac1b0ceecf2b154bde4e817bb4744e47a9fed84a720777

  • SSDEEP

    3072:j98HdmPaFGq5PBSVjDW6iw7qLQ68E97JEXPk7fD162zVnt7jsEmST0nYXbg1DE:juH8+5PBSVjDW6XNu1EXPOfD162P/sEL

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e
    .elf linux x86