Static task
static1
Behavioral task
behavioral1
Sample
0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57
-
Size
97KB
-
MD5
62a9cd9306104d9526b6f0646532f4e3
-
SHA1
40cfbe564ef43b1e14562704b571e75aaf1878bb
-
SHA256
0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57
-
SHA512
645a9ceac4a98d3bf248b7baf204a5c54cfe521ef80df81e3db605f231cbab29e24fec8248f829e9254be92537011a6612ba46e6c48321928ad9f82050e8395b
-
SSDEEP
3072:VK1z13U6HzHoXRtmTUhQogVqmmFVcqq0G27ZT:VK7DDeKlogVqmmFVcqq0G27ZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai Payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt Variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai Variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
0c4e4257fb18399bfc80b28b91b7823e9b4f526f8741b7b27dc83a838c5c7e57.elf linux x86