Static task
static1
Behavioral task
behavioral1
Sample
40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736
-
Size
148KB
-
MD5
076619afb9da69bbeddb045d1dd15bab
-
SHA1
ef824cd0ff3b019c6c666fa6b735b4c351479438
-
SHA256
40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736
-
SHA512
c55d44fcf3cda4dc35091d491fef909f845a222c6dba8fbbc9d7a703101eb5e21f719253d7086c056d858f633f9453462cfe724d5a24920f6e9c8000167f1cbf
-
SSDEEP
3072:HE9rx5elUUrxUVVpSE8JqMuOltGDalhGpRwWriH90PfNatph1:MxPaEx9M9lSekiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
40c7379abc75f1e5230a6a505d12ff7fa535e6efeaba8e22eb2d7e24efe10736.elf linux x86