Behavioral task
behavioral1
Sample
52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0
-
Size
97KB
-
MD5
ec39fc93806cc7dce3b2eb51e2d2b4c4
-
SHA1
85b258612668d0e6a0f7d2e7583fee96ff635de4
-
SHA256
52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0
-
SHA512
c2e3cd54bb68b98eb11b89a2ef3590d7939383ec520f8367e81009fd8ae96efd91eaaf1540b78227d03da1c5aba72fb63b1805e0034e8c15708ee54a8dff58c3
-
SSDEEP
3072:VK1z13U6HzHoXRtmTUhQogOEmmFVcqq0GnDZT:VK7DDeKlogOEmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
52e6cf7e91252c93ff95e438b25d69fb4361f63c9b2a51aacc970ecca81ea1d0.elf linux x86