Static task
static1
Behavioral task
behavioral1
Sample
424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8
-
Size
79KB
-
MD5
caf268636899543f8f97fa41a002772e
-
SHA1
5cacccfc2bf1ea952ff5e407531816119b80b5ca
-
SHA256
424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8
-
SHA512
c72d11ca212b6fad0c1de19581918b8a299154323539ab3bf8935d91a6cf51dbdd7ae96743b34c8a52c7e8ad2fc831c45b1864bfe0547dd7cd1db82b532ac5bc
-
SSDEEP
1536:BUyUJSLLxm98ujh2wMzPoO8/2XEsdYP1zOTDVpSm45hCTw7mmJ+4VTCjpMfPvB:BUyUgLFm98ujh2wyJ8/MEGYPNOO5hCT+
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
424a38a4bea2abeecd559ee57ffd0a4ab1581c14482c0142773ad289b02a17e8.elf linux x86