Static task
static1
Behavioral task
behavioral1
Sample
35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2
-
Size
85KB
-
MD5
8c4bbfef5c4e93cfa936686758cb0613
-
SHA1
204431185b7f9078ddd82d608ac2e427aa3f3f1b
-
SHA256
35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2
-
SHA512
e36db7b2c0117ed680a91a161b31cdca1e7b40ad07331d5473410da32ce66638d840796cef285a677664eed617708678e561dd275a6415644b8bdd3409d0f800
-
SSDEEP
1536:f4rEUHe3QUzEPuTs5loupkqBYlww9k4cgtAPHc5hCosG7she0QzUzJYQ2Wk:wrTLUwmYwup0wak4rt5hCe7Ue0QzUFYV
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
35e65239c6b09279cea1154cdd9e8b3861f091ae803d784f145be6b3b87a10c2.elf linux x86