Static task
static1
Behavioral task
behavioral1
Sample
16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2
-
Size
98KB
-
MD5
43d2a3fad21d67b2228db2a86eed325c
-
SHA1
4ffcd5b47f8bd5ed9296ff45d9c96f3e5be85f89
-
SHA256
16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2
-
SHA512
2556d29da380bfdf651a7aafa7ec4fac89b550dda11f852c5e562651555019b227a189833dc795b7115d7cccf67c8bab5752ca94422759c4382cc74ebaef11ab
-
SSDEEP
3072:038xE4U8+wWWM1dQZrRkGBPtrEEkVDHFE4gqtaadx4:03eZ+jWcq+EFrsDHFE4gqtaadx4
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
16e5dae8b195473b04678056142f32c6a4c45c1d1fcf0bbc83d827615bbfdaf2.elf linux x86