Static task
static1
Behavioral task
behavioral1
Sample
40ccc3f28430d80153c0966801fd2581815a6ffa48bddf0253bf9f138eecf704
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
40ccc3f28430d80153c0966801fd2581815a6ffa48bddf0253bf9f138eecf704
-
Size
93KB
-
MD5
2107949316fd11c3a1f59fa7f14930e4
-
SHA1
68d0d5b2e04aa7da3ce896ea1f416c837714f813
-
SHA256
40ccc3f28430d80153c0966801fd2581815a6ffa48bddf0253bf9f138eecf704
-
SHA512
7c9b2ffe043869c0dbf3c2a4b30140f9c1ff9aa6bf83890a18ea3b262560335ac369f48a67ba2fa75f2622852fda532e19a9e96baaaf13dcc76087167b8ca69d
-
SSDEEP
1536:O03hlMYGq9RWfCMfNKyWQ6nRlEwscCnMCYeZALe5hBzxrlLbPM37K8PN2UrYe:5hJGq9RJINetnRpsJMCYeYe5hBjbE371
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
40ccc3f28430d80153c0966801fd2581815a6ffa48bddf0253bf9f138eecf704.elf linux x86