General

  • Target

    16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2

  • Size

    98KB

  • MD5

    43d2a3fad21d67b2228db2a86eed325c

  • SHA1

    4ffcd5b47f8bd5ed9296ff45d9c96f3e5be85f89

  • SHA256

    16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2

  • SHA512

    2556d29da380bfdf651a7aafa7ec4fac89b550dda11f852c5e562651555019b227a189833dc795b7115d7cccf67c8bab5752ca94422759c4382cc74ebaef11ab

  • SSDEEP

    3072:038xE4U8+wWWM1dQZrRkGBPtrEEkVDHFE4gqtaadx4:03eZ+jWcq+EFrsDHFE4gqtaadx4

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2
    .elf linux x86