Static task
static1
Behavioral task
behavioral1
Sample
4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0
-
Size
91KB
-
MD5
1129fc87c01eab0106fdd61d849648dc
-
SHA1
1d107b594dc88220a6b30cea62a33c57c2f206f8
-
SHA256
4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0
-
SHA512
8dfc31e8edef3b885a7ad6b8e247ddf79a28c91654a61f26f691767e2a3d029512ceb4c218fa7ab99daa8894fc303a84e4ca6d65dda8f08bad68e7b67b672333
-
SSDEEP
1536:h9O91OMJcUeUN3NXahSkCWG3CeQoQcr9lh3aNXocX1WE7GUKAqsANOaKnD3L21MH:h9HM6UeUNtahSKG3jQoQsDh34voE7GUh
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4b24623ce49dbddb6c63e77c3384c547811a85f45f81908315842da1ea2700a0.elf linux x86