Static task
static1
Behavioral task
behavioral1
Sample
4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c
-
Size
122KB
-
MD5
58942045be290045ccce23385558b743
-
SHA1
840dcccabfcb3959e1d7d9af763f37df9b0be8c6
-
SHA256
4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c
-
SHA512
d183059d3eba297ddbd3b7037955a7ea56bdbba3aa12799413e4b09393784e57f8863c17aa882c0c04e44240548cdebf75633da2ce78497a820f2e9992b97878
-
SSDEEP
3072:9QViZwVPs9u4vM9+NS+etJ8add9QzTsqzXHt4NKcXeGcgqGK:9BqUtUSS+etJ8addQ7Xt4NKcXdcgqGK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4d7e041b090e445016c5d67bd3628ad2fc536580d8742ab61773515993bb8c6c.elf linux x86