Static task
static1
Behavioral task
behavioral1
Sample
4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643
-
Size
164KB
-
MD5
0df650b820b5ec576afd2063bf1ab94d
-
SHA1
958d60a69e3e6aadf3f612bfc3cda0556aa78630
-
SHA256
4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643
-
SHA512
fa8c04cd10a3321cceb2668dbd1cc41be948098ca3638928fb69752e9440c1caef5aaa876757570f8737f9f203efd3eb814fa4abcafb78ccc36bc69fda08b356
-
SSDEEP
3072:QtT6Jq7+TPDcVjQWsa4xA1iPlmTJNq8WbgDI0onDM0hsJmbeL4jDPY1yE/vHtsS:QQJBTPDcVjQWszCq8WUbon49mbeL4jDK
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4b1f33434b9bfb38531376b27258a7f2f177d027ff3b7bdf5e03d32f8385a643.elf linux x86