General

  • Target

    165f25b3a88f585f26fa7bd80000ba8fdf3e51dc13845f4b1ecfff13cd9ace51

  • Size

    97KB

  • MD5

    c527bf0d5dbe12385e91d0b8d89957ab

  • SHA1

    547cad21cd185b6ed3cda2e8aeb083b1e1420a17

  • SHA256

    165f25b3a88f585f26fa7bd80000ba8fdf3e51dc13845f4b1ecfff13cd9ace51

  • SHA512

    e236d8eb8515e0fa3947f21c6edb32f206613f4b7b2560b1ac9ab68adeb0a23ae1ecc066b3743733d87ef08871d782d5a71e3aab2ddb1312ed08ed6487a43cab

  • SSDEEP

    3072:UwYfmdU2Uh917j8D8r59CPhDdAURyv/Q5hhjP5PQinf0OziyoQQuy:Vdxu917j8D8rCDA5v45hJNQinf0OziyO

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 165f25b3a88f585f26fa7bd80000ba8fdf3e51dc13845f4b1ecfff13cd9ace51
    .elf linux x86