General

  • Target

    4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8

  • Size

    134KB

  • MD5

    4430993e9e61108925565551d99da046

  • SHA1

    ca963dba6edeff4c1e12bcacb379c4ea0c60cceb

  • SHA256

    4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8

  • SHA512

    c44e111143915a01721b01eac9bf6f0125df0aefc71e5a4a6c4d87a6340ade4693941460f44dc9663c2512c02e3a0d63e1afea10c86d53ac533d3202be4bd2d8

  • SSDEEP

    3072:GbA8hDg6mW4JM4QqukcT2OOSoA7uMmq0ichYyeaK0FU:G08VvmWPOSoeuMmq0ichYyeaK0FU

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8
    .elf linux x86