General

  • Target

    50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7

  • Size

    119KB

  • MD5

    75407d8bf754e7eaca0b62b584c7ac14

  • SHA1

    c7cacca9aca1ef560bde716751913cb1d8e14f05

  • SHA256

    50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7

  • SHA512

    12fb67e173c859ce1055b65ae7d2794a15d1b524255f51aff612a9aef8e2a555cfa15f19599880797662995212928c4815fbba3437a29db513540d2d72ff291a

  • SSDEEP

    3072:V4DmGzbEUWPT+7XdpgcTl9NTTVztrRt1KFGwcz0Y:dGc9TivZh99ptrRt1Kwwcz0Y

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7
    .elf linux x86