Behavioral task
behavioral1
Sample
UnHAnaAW.x86
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
UnHAnaAW.x86
-
Size
60KB
-
MD5
f0735a2744ec7d28972d0b8d2064fce5
-
SHA1
9c2233910673c9387c65ae35a8640604960e0dad
-
SHA256
0706386cd36628da345d3af948764fcb6585bcbf53699066e6a2f70ed251c8e8
-
SHA512
30b3481b3876083145d39c6fe5944986dc272daae2d72c83f621df8ac8c7578923e8dae7fc6a005dd6d491ad7c8be44f8dee9d14855080675d168eb0128d5951
-
SSDEEP
1536:EiqvoMDZVZWJpqZhPOnAiHhwt2/mqMma++tSYK1Kf53j3Qp:EiqvoMdVZWJpqzPchhk2/mqTantE1KfO
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Echobot 1 IoCs
resource yara_rule sample family_echobot -
Echobot family
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
UnHAnaAW.x86.elf linux x86