General

  • Target

    16e96a8fa03ccf66bddebf02f32a63c3f9e707ee72e534e5bf9158a650eddf64

  • Size

    72KB

  • MD5

    0ed9cdc660e5c5d1ab8105b28233ea91

  • SHA1

    4e2b10cc8b78c5da4f082c1c2d9320cc7d2a78e6

  • SHA256

    16e96a8fa03ccf66bddebf02f32a63c3f9e707ee72e534e5bf9158a650eddf64

  • SHA512

    5247e03a462f19ee3efe8fa210499a5b31db1c1511bb3616d6b9b2fc1a16bb8bee4570814488bde8787c5686bb13f1aa9e873d540cc99fd62dee77e47808da5a

  • SSDEEP

    1536:0+xNVpGQWuKv8xKBnq5PeOj5zMLMS5qmLI2VOCjXUfJRk:nNT830xKBnq9eGTS5qmU2VOCbUfJRk

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 16e96a8fa03ccf66bddebf02f32a63c3f9e707ee72e534e5bf9158a650eddf64
    .elf linux x86