General

  • Target

    96e7382f66f4c8ea97141657e9160617cf63f4946165fae72181508de58060de

  • Size

    77KB

  • MD5

    2244d266db5242cc4fb0b7acea718cd8

  • SHA1

    c347fee308b33f8dfa1eb79939851ada22d3e19d

  • SHA256

    96e7382f66f4c8ea97141657e9160617cf63f4946165fae72181508de58060de

  • SHA512

    88d3a3bb8991f3895fb959aee20c77f4c667c28846a4036241311f1fc33829df69170c7e9e8695c3dba1d0b69e3bd43fd47fa091375d93f18f1b468268fde459

  • SSDEEP

    1536:TK4MquPsLoPWW+zstB5/1XGEiaC6HKQ/nkXs3pVO6IQ6jOD0:SqNcHNtB5/BTiKKqkXmpVO6Z6jOD0

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 96e7382f66f4c8ea97141657e9160617cf63f4946165fae72181508de58060de
    .elf linux x86