Behavioral task
behavioral1
Sample
UnHAnaAW.x86
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
UnHAnaAW.x86
Resource
win10v2004-en-20220112
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
UnHAnaAW.x86
-
Size
72KB
-
MD5
2fbd7450e710106e40f973c15359d94a
-
SHA1
981cf3e75f770741b2c8287fd080e0bdd31b17f2
-
SHA256
f28f21fb731b222ba26788a21c5d8f9547c55e3a1703204fb634c7cdf12f75b4
-
SHA512
5098684ea0b96cd2e663374b7eee3fdece6170c6eca0edecd7e11f17eb198cd97191c572a8e8aeb0876cc8a99ce45962ee82d55ab5baa5ea3cf78a5beecf76e8
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Echobot 1 IoCs
Processes:
resource yara_rule sample family_echobot -
Echobot family
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
Processes:
resource yara_rule sample elf_mirai_auto
Files
-
UnHAnaAW.x86.elf linux x86