General

  • Target

    5c4a41d61a0ebcaeb62da6f04a9cd61be6cea8c728a3796d53108abea87ea3d9

  • Size

    94KB

  • MD5

    d493b9b1f40c8bf668726540580c7db2

  • SHA1

    477075fd59593a8daaf300aef248f61349d3e599

  • SHA256

    5c4a41d61a0ebcaeb62da6f04a9cd61be6cea8c728a3796d53108abea87ea3d9

  • SHA512

    6c8289c431ba41b4697ac8c03fca36158d3c9a7a2a39f69fb63ae0f96d9d26f38d86019944df57bc9033c76f4e577bd4b78bd5cfdd5e9bf5e079a994ec802d30

  • SSDEEP

    1536:c7KYiKuiIwUrYoHpwY0z9Z+TiByRS+Oto+zm8AqrRKbtrqmmiIVcqqzIGnOZT:c7KYYtwUrYoHKz9ZUigRS+Exf1gqmmFH

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5c4a41d61a0ebcaeb62da6f04a9cd61be6cea8c728a3796d53108abea87ea3d9
    .elf linux x86