Static task
static1
Behavioral task
behavioral1
Sample
4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8
-
Size
153KB
-
MD5
1cb073acd57fef9b4cc5f454bf5a0bcd
-
SHA1
7aea56ae52bf9f897a10092dc25cf2b6956294a4
-
SHA256
4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8
-
SHA512
1ba212de60c3eeff149472f413646d2e7d9956fd78f8769a765915cc7d505a0edbd505aa53e381bef99ea0403eeba26aeb4aa6b97f2a31f448e749e480ef6c3a
-
SSDEEP
3072:x5V27AY5DrQX1qNpd+Me7wCUhsOlt511HbxhY/XH90PfNatph1:xX27PNe0CUhzl91HNhkXH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4bc285ca04f633bd49d48fc5aaa64fd55d5472edf49286464f1d61cda58e59a8.elf linux x86