Static task
static1
Behavioral task
behavioral1
Sample
c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323
-
Size
98KB
-
MD5
29fbba9f8f28778c5b1178815c45a577
-
SHA1
9704724177cb6321f3986f23cbd6cb0e5c837337
-
SHA256
c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323
-
SHA512
c24b60a72685137d1e51b01770004ba46f7b50309e3db6d68e1a3ca84b03a7fbd5b1fb138494fcc280fa998f054abd5da100f846036e147641231739262a9523
-
SSDEEP
3072:he7EqeQUHfPyjRJ9rBFKqgMF1QmqoVcqq6GnQOT:heZyo5KqgMPQmqoVcqq6GnQOT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c5fbe58334c3c0cb771773ae558d478cb6c043e94752d4bb858402166a4bb323.elf linux x86