Static task
static1
Behavioral task
behavioral1
Sample
7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385
-
Size
98KB
-
MD5
bb9b23ba771cc37d8114933b09b568f9
-
SHA1
541eb366b02fd58bff466f57af95cc499647da43
-
SHA256
7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385
-
SHA512
89dd2b40894f6d84abb59323de9a32160edd3c665c72f6941e6fb4d2c292356ed14b860c01c017c9ef4f2f84cbb4fcb9cf06c942036f9f81ef108347f9379da5
-
SSDEEP
3072:rAsWIUNN1SvsMn5BMFbp94bHimS0veewQ08N:nKeUaSb8bHimS0veewQ08N
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
7808d7414d5c7c7f3705f4b40d28234d736d895dc562f12103436440f44ab385.elf linux x86