General

  • Target

    c929449ca0781461a369ddedb0c3719ab856ac1c74556af51786d3b0a4424493

  • Size

    102KB

  • MD5

    52dc31005fffc96de1ecd7f76179750a

  • SHA1

    4494b5d53e9f386643114a7c28e7453cc14fc7ce

  • SHA256

    c929449ca0781461a369ddedb0c3719ab856ac1c74556af51786d3b0a4424493

  • SHA512

    11e6ba04b8f8f80a0b91a54af775f1096f3c616d3dfda9f09eb4b6ad901584ac3964a50f5f32c15663efd26036cb3a70906088cf85e09cc6b226b983d44399ec

  • SSDEEP

    1536:1eLBA8EPuP+CFMgTW+K5gJsRVfgytdQV9+qOS1swmqHIVcqqWNGnQOT:EAVuaH5gJsRFgaq3swmqoVcqq6GnQOT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • c929449ca0781461a369ddedb0c3719ab856ac1c74556af51786d3b0a4424493
    .elf linux x86