General

  • Target

    4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff

  • Size

    124KB

  • MD5

    29a7f9ab5437f0fe8e51124eee0b9fea

  • SHA1

    19167457cda458b2146b082d20de3e028a50fe86

  • SHA256

    4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff

  • SHA512

    41fba3e1bfd06e6465397ee59f5f93993f8fa1b549931ff044d2cce693ae343d8d161e4f30aa7424f73d6b43fd4931040b1e0612e6a177467dbb565a5245b275

  • SSDEEP

    3072:EXY5gzI24XRFnHb2ohcQeFxfusim3Z3OhzD9oY4giAGaJpP:EXY5BDXR9dc5Om3Z34zD9oY4giAGaJpP

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 4fbeb734c95e3026225128e2433cae46d33c307bdeef60a7def86d30d80c50ff
    .elf linux x86