General

  • Target

    4e86e2b11b5755d5be89388a43c42818b8b3a9357353d1dec5fa73dc394b09dd

  • Size

    93KB

  • MD5

    0113d8533d08771b5f8ad0988bcdf556

  • SHA1

    0365077666116b86704556db1d7cf427d2c34b0e

  • SHA256

    4e86e2b11b5755d5be89388a43c42818b8b3a9357353d1dec5fa73dc394b09dd

  • SHA512

    a93d0da7a7092d9227b6b92b816372f632b4d2675610fd93a012e1c7cab81d9c34e00e58e3e18859051e43703c12bfba8b777b6b131ed687f6802139ee460ec1

  • SSDEEP

    1536:2Swafh5cfDj5lLWybWGKt/QFPYv/KDU7OclnmEequN4cGb1Mh7yMLN2UcYV:o85cbj5BWfjt41sCDUrlmDD7GbSh7yMj

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4e86e2b11b5755d5be89388a43c42818b8b3a9357353d1dec5fa73dc394b09dd
    .elf linux x86