General

  • Target

    4dbc0ea63fa4e22710b5cf8176045d5594bc1cc429ca9f16ea450f8ec2c556b0

  • Size

    89KB

  • MD5

    8ca6bd2655c420f7acba68ed160be6fa

  • SHA1

    5403e6b8c28467630c99d0336035294130dfc041

  • SHA256

    4dbc0ea63fa4e22710b5cf8176045d5594bc1cc429ca9f16ea450f8ec2c556b0

  • SHA512

    ea39898165b74f404d4b633a287d17f25034e143bc331043b9a7cb4a62fa7ee57af089b3b311806b250abc0ae8efff1f2e4f795c4a098b8ac43bf320501aa9c2

  • SSDEEP

    1536:2bcSA3zJO93RceGQwqWQC1yIZ2DN1d3OoT5hBayrJs6Wshe0QzUzJYQ2Wk:kAI93RceGT91yIZ2DN1Qc5hBaqWUe0Ql

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4dbc0ea63fa4e22710b5cf8176045d5594bc1cc429ca9f16ea450f8ec2c556b0
    .elf linux x86