Static task
static1
Behavioral task
behavioral1
Sample
4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1
-
Size
115KB
-
MD5
83927671ee342ff9122c962c667da23e
-
SHA1
2695f1a0c73a810b9d24ab035361be45d0011bf0
-
SHA256
4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1
-
SHA512
b29f3409b93fd7879b556e8704a57e86efc9477203db42964954f9fced0d0e2319ffa1317bad8089ca1d1f7c816237b06a67796fe25b86ed9d22ffd4fb2246ee
-
SSDEEP
3072:yM4JAsTxM7ZNvVafgGetJ8au49QuTsbez3mbVS+Il1iUnnl:yRQZrafPetJ8au4lcez3mbVS+Il1iUnl
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4d60a44ae052fa97ec5a914be8499cf25dc4541157d0e5f942b8fd00165e72a1.elf linux x86