Static task
static1
Behavioral task
behavioral1
Sample
44d2595e1c72bd5b34d2111db1d3ed90f3a6190dcf62942f8ee2f3805f1501f3
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
44d2595e1c72bd5b34d2111db1d3ed90f3a6190dcf62942f8ee2f3805f1501f3
-
Size
89KB
-
MD5
5a77859a4a4651155033e62bc0e36bdf
-
SHA1
5a66720421cb8edaba5239ebb1f71f4b9c47e09b
-
SHA256
44d2595e1c72bd5b34d2111db1d3ed90f3a6190dcf62942f8ee2f3805f1501f3
-
SHA512
055f193af5078136287e80048827d5394782970446dd2bff610e0510fc08e3eea30126630e2fc8eb45388cf062993955dc47ea4ad8eb48ba1d84b385b9260f87
-
SSDEEP
1536:KWsWNGMnmiUHtVuRX6/3PYUOXXtpdM35FIA6kMnY1YhtMatutcZROG7gyqc:Js81UNYRy3PYnXdpOsA6kMY1Yhtxstcd
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
44d2595e1c72bd5b34d2111db1d3ed90f3a6190dcf62942f8ee2f3805f1501f3.elf linux x86