General

  • Target

    a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d

  • Size

    97KB

  • MD5

    a58f7d321e0f9799b49597d2c9b909b1

  • SHA1

    4a7e96e010796038aa9b109ee56abeab84019694

  • SHA256

    a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d

  • SHA512

    3aa640c3c606a8c262c63063e0ee8818f9dee50f3bb92faac8fbfeb0ba4ff948c351d9a8ca5e1c1951fb1d191e0567cdb4573e84af74d0a76c489bc1e6772a86

  • SSDEEP

    3072:VK1z13U6HzHoXRtmTUhQoguEmmFVcqq0GnDZT:VK7DDeKloguEmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • a4dd9c5a8c4d732afe261bb02b8919aec85fd0d5c983d38dbd84d9ac38e7b77d
    .elf linux x86