Behavioral task
behavioral1
Sample
2ab5e6c9f643449a2b52cba85c2873db
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
2ab5e6c9f643449a2b52cba85c2873db
-
Size
60KB
-
MD5
2ab5e6c9f643449a2b52cba85c2873db
-
SHA1
4b2e2774550aec5519199df0084ca6efedba9440
-
SHA256
3d9b8e14fd03be0e9346592f7aa97b052f7b313b681e0a6e6dbc11483a15ed28
-
SHA512
80319ecfc70bbe0d7d37b58dde2bc039d216ee10bef486fa9ec51c1c4f100b1bf1bf1c6d012d0f16e099016b95e8dcd4dfc72e47804353235966b6e7ed769fbc
-
SSDEEP
1536:34WurpEUbOGQzfxDrh3rm78GEgC2nheiY4ZJsqR+k7/wpAdALnEo3t:oWurpEkOGQzf5rtK8B2nhei3JsqR+kE9
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Echobot 1 IoCs
resource yara_rule sample family_echobot -
Echobot family
-
Mirai family
-
Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs
Detected Mirai Linux malware
resource yara_rule sample elf_mirai_auto
Files
-
2ab5e6c9f643449a2b52cba85c2873db.elf linux x86