Static task
static1
Behavioral task
behavioral1
Sample
d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3
-
Size
113KB
-
MD5
9dcdd7c677cb288210f1590b4b9b011d
-
SHA1
bbeb6098fdf402e4e06b2005ef3533a5492b3c0c
-
SHA256
d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3
-
SHA512
9b833ab3f26fcdbe6f401df1219770c286231dd7465b2dcb359d389229150c0c4e4b7109b36f3095dfff0874dc2ef1135f81d4f92a5707e840a237edf41f00fc
-
SSDEEP
3072:Udu82mUdg3UfP6JiBAt6FcetJ8au49QuTs19txAtc4kG7gyqc:g9+zit66etJ8au4lS9txAtc4n7gyqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d854d2b43b053b47f4b5498dd625807b7de4c578c03049ad3bf2eb376e09e8d3.elf linux x86