Static task
static1
Behavioral task
behavioral1
Sample
4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d
Resource
ubuntu1804-amd64-en-20211208
linux_amd64
0 signatures
0 seconds
General
-
Target
4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d
-
Size
137KB
-
MD5
2a532ac01fb5dd356cbefc2886eee9ca
-
SHA1
46cfe0bede0a6bd7ae4b2a102a67a02560339b25
-
SHA256
4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d
-
SHA512
66e0e6e97a8b952bda8852b925a7f87a5df96b1fa7124299a005a642d15327816160b02149b5aac67187c472ab43d33be3f0c17ca4578a6f4362630c1d8209e2
-
SSDEEP
3072:kFVA0rcebUWmXkKusiMfOEqF8+wBiDBda4giJHaEFk:kFVA0Bbm0xsjm3zwBiDBda4giJHaEFk
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4a22da69b8865818685b2241fa1245c61887b4ac54d9e0c71edce186d36a2f9d.elf linux x86