Static task
static1
Behavioral task
behavioral1
Sample
c1945aeed9c1be93a982a1b414507333
Resource
ubuntu1804-amd64-en-20211208
0 signatures
0 seconds
General
-
Target
c1945aeed9c1be93a982a1b414507333
-
Size
101KB
-
MD5
c1945aeed9c1be93a982a1b414507333
-
SHA1
3c020c0860ff990f73e2c05878584ae91eeb48a6
-
SHA256
4ce439a6065e0db691ec4472be8f065d05141e0fc46de046c0a28d1b71cde244
-
SHA512
376417ebd63b8508c3f96f26393679a6eb9e5ea689597e2b31c34d334c8838eca7b4037d91b87b1f5cb727c2d1e991bf05f5334e08a6281e107b51bd0cecb57d
-
SSDEEP
3072:wW8FUmgujld6Mkxm6AJ+4fnFmmFVcqq0G27ZT:wJFv4Lm6AJ+4fnFmmFVcqq0G27ZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c1945aeed9c1be93a982a1b414507333.elf linux x86