General

  • Target

    5160799ca176d44b08f21e24607378569bebf99ba9a43bb3afdbec3f5da12a2e

  • Size

    128KB

  • MD5

    4318f7b7a9a4717e6cb0b07dbe05c7b3

  • SHA1

    072c5169bf882bc15ae158f165a93de9c4b48f8f

  • SHA256

    5160799ca176d44b08f21e24607378569bebf99ba9a43bb3afdbec3f5da12a2e

  • SHA512

    518cfdbe2d4d38bdcd4f20caffee6afc4518983cee8c71f68422de107426e4b3b52942fd470004cd500b294bc26fe1b118ffae8e658bbbfcd083e6db8e9c069f

  • SSDEEP

    3072:st8pzReTk6/W8409dw80etJ8ajlvwigrK01NiG7cq0t:st8pCLddLw80etJ8aZvvgrK01Nh7cq0t

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected Gafgyt variant 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 5160799ca176d44b08f21e24607378569bebf99ba9a43bb3afdbec3f5da12a2e
    .elf linux x86