Behavioral task
behavioral1
Sample
52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a
-
Size
97KB
-
MD5
18c3f64efd682fa644fc4db75f924af3
-
SHA1
656c02bcd81172ebcb562e49c29ccc8093398ffb
-
SHA256
52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a
-
SHA512
e96fa4a4fc1c7b899631343c3b423cf1ac133277af0ffe9afa3fc0337bdb9861459c848d537f17efaba3a8215334424c34b69e7070f2ca29029c64368b9320f0
-
SSDEEP
3072:kA4JmdU2Uh917j8D869ACPhDdAURyv/V5hTT3Pxinf0OzTyoQQub:rdxu917j8D86pDA5vt5hv/xinf0OzTyv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
52f4797174d9b0518ac08ad4024681b8db35b62e3ff740717b9ad26af13ed65a.elf linux x86