Static task
static1
Behavioral task
behavioral1
Sample
pty4pimkkvvs
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
pty4pimkkvvs
-
Size
90KB
-
MD5
60f50372901a3ab6be093cb9922fd75c
-
SHA1
03fabbbc736a5c59b889e3675331c96263d4a4a6
-
SHA256
16b4093813e2923e9ee70b888f0d50f972ac607253b00f25e4be44993d263bd2
-
SHA512
480ce401e171d29483b5ddf2b732f8959daba11c8b25538d179cc93795594676aaec3ae078cd312743a9cecf78ba533a58ced339fa63e2b5e53b9077933d0e6b
-
SSDEEP
1536:pe0MIyLxo/d9zL+dQc55mOVUcfkmWSVPOZ5RGG2FNVMIzJLayLaI:p3y+/d9fSQmmlcfNWS9650lGQYV
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Identified Kaiten Bot 1 IoCs
Processes:
resource yara_rule sample family_kaiten -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
pty4pimkkvvs.elf linux x86