Behavioral task
behavioral1
Sample
531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb
-
Size
126KB
-
MD5
a8b48578cc57933a0e3085974b4913d5
-
SHA1
7dfce31c3dd12b262ce9110e3f51bfe102cb9ac4
-
SHA256
531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb
-
SHA512
84eeb8539463675aeb9f07055643db79e70f5b34c2600a82da2d5cda036b93dad21ecc1c3aabe75de44a7667b546145f9217550a1bfa3794ae6e5204e0eb8ede
-
SSDEEP
3072:5mNXkOR3wiTURjAGhdEetJ8add9QzTs1TIt47KcX6GcgqBK:gk+wd6edEetJ8addQiIt47KcXJcgqBK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
531ba0b854df78a0b81255d92af6e9ba738b2deb675774bc6d240e5d3ba599eb.elf linux x86