Static task
static1
Behavioral task
behavioral1
Sample
d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc
-
Size
98KB
-
MD5
a07682fd7679c384ff45f3d4c57f5d09
-
SHA1
67babc8ce816a93711ac1ab0babebb547984b6ee
-
SHA256
d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc
-
SHA512
733dffc1b9d83720b18f0143a915e41f37b0ce927135bea161b4bc8dbef6ebcbda1e5210274c684e875496b673db3eb2b27588e003dc5cf7432feb53c9e20513
-
SSDEEP
3072:SHmtkqC/0anNLXHwleeL+I5GvEXmfKgo6uQGKs:SG3BCdeL+I5GvEXmfKgo6uQGKs
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
d1dabdfc5b9ae713b6106956858950d06a32a3b8ffa0e4af65ddc4b1c48860fc.elf linux x86