General

  • Target

    169e931d018f1d5c70e1daf33f6cf2cfd27ff75c17d065f99f90b576991f7e3c

  • Size

    98KB

  • MD5

    0ae1154afc0797791b24d37f5af06cfc

  • SHA1

    58cd9c152b382a645ff67d7ae0b5ab1a3631d825

  • SHA256

    169e931d018f1d5c70e1daf33f6cf2cfd27ff75c17d065f99f90b576991f7e3c

  • SHA512

    d2d2b53347684ff2890f242f1c14e8004de70e0a3763785f6921c6bee770d087430d8b78e80d73ff00b10288ee5c3cbb1047848dffa754e60367692543b8e730

  • SSDEEP

    3072:038xE4U8+wWWM1dQZrRkGBPtMEEkVDHFE4gqtaadx4:03eZ+jWcq+EFMsDHFE4gqtaadx4

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 169e931d018f1d5c70e1daf33f6cf2cfd27ff75c17d065f99f90b576991f7e3c
    .elf linux x86