General

  • Target

    e41f4fa239bdd47564a07893b18ea8092c8117bfb14410c1a20e1a960d3a2116

  • Size

    86KB

  • MD5

    bcd4180961ae588cd9878ca697583161

  • SHA1

    6c725d1bea0b20f94efe535d35034ea27d6def2f

  • SHA256

    e41f4fa239bdd47564a07893b18ea8092c8117bfb14410c1a20e1a960d3a2116

  • SHA512

    535a7e6fb320800ecc1d165f43b6326cc4796daeee4e3d996926681823a6aeada865d5f683a3bf489a14dd3fbc70b253bbc27050f635ca53d050433265341587

  • SSDEEP

    1536:i44wE1Icbs+UzVV13Kp1FDdEloVXlRI1reHAWQ5hiaq+7she0QzUzJYQ2Wk:iVwjgUpD3K9DdUoBXIteK5hia7Ue0QzR

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • e41f4fa239bdd47564a07893b18ea8092c8117bfb14410c1a20e1a960d3a2116
    .elf linux x86