General

  • Target

    506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47

  • Size

    116KB

  • MD5

    de24b4e3738359189e8f0ceb65babcee

  • SHA1

    4d53bbfebba4449ed5b6990698a785f9dfd08788

  • SHA256

    506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47

  • SHA512

    1c0c8176bc50707325694caf3d185b69e5f4e37591f410e7c0d195aafa9e2a972acccb71a696e4c37d28eaeb53dcc8d651ff2426eb55305b6960bf05c917ddf0

  • SSDEEP

    3072:DDPQ/zYsolVIO9DG2etJ8au49QuTsd2og5+rYE3EgxstcZkG7gyqc:DcQVT9D9etJ8au4lm2gxstcZn7gyqc

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47
    .elf linux x86