Static task
static1
Behavioral task
behavioral1
Sample
assailant.i586
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
assailant.i586
-
Size
97KB
-
MD5
2fc7a6af0930180d61de32e94b9454b6
-
SHA1
8b0d585cf2c2ef75393dc31fcaa22ac46ac74ed3
-
SHA256
6388aa07338ff0d4b596d327d72248ed58a7a14a476bd6ad17a198c89b731272
-
SHA512
b933bf5ff05a25f2b0475d06c12742edbad0e309b856075b3886ef0085e4f3797044e2a8da2fc305c3801c6c49b03be29d43058f54eacf862de1b50af68cb200
-
SSDEEP
3072:dUICodUWUh917j8mc2deiPUDAZURyPfN5hVTFvxinf0OzTyoQQub:tdRu917j8mc2H5Z5PV5h1pxinf0OzTyv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
assailant.i586.elf linux x86