General

  • Target

    093f16ab4c30bdea4dcd1e6408ed61fab1a18fc279cca1e50f49af0f140b396e

  • Size

    101KB

  • MD5

    d636c06246e4127019f6261dbdf951aa

  • SHA1

    a3eb7437b2e4bbdf0553cee4dfc5b97f3e2bc78d

  • SHA256

    093f16ab4c30bdea4dcd1e6408ed61fab1a18fc279cca1e50f49af0f140b396e

  • SHA512

    ec9c162023f19a009694c474b62c81eada7e4d6dbbeefd7305cb2022b921bb8cecb64c7571df8665fc823bb08f5827f6b67a2b081016d3ee38eef766340183e1

  • SSDEEP

    3072:wW8FUmgujld6Mkxm6AJ+4fgHmmFVcqq0GnDZT:wJFv4Lm6AJ+4fgHmmFVcqq0GnDZT

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 093f16ab4c30bdea4dcd1e6408ed61fab1a18fc279cca1e50f49af0f140b396e
    .elf linux x86