Behavioral task
behavioral1
Sample
521fa830d91dc45ff0ef9fd02db624ca7a8fd75fd1696d8f24fcf5e03884ad12
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
521fa830d91dc45ff0ef9fd02db624ca7a8fd75fd1696d8f24fcf5e03884ad12
-
Size
91KB
-
MD5
55b5f561de1863d18f3f3db97d16a2b8
-
SHA1
df2b9ba15a3d734aa00edd8c868be48acc300a5d
-
SHA256
521fa830d91dc45ff0ef9fd02db624ca7a8fd75fd1696d8f24fcf5e03884ad12
-
SHA512
ee7d6e6b44ded506b2c7ad245151bd41f384444dcd256f77d310d4b975b6da59d7d66b39bf005e4bbedd7a7aa460fbe5e368dbea4b5bf25cee48dd75f4a1feed
-
SSDEEP
1536:9BO91SM5/U+UZnp+u03MCWG3CeQoQcr9lh3aNXocS1RGUKAqsANOaKnD3L21Mh7t:9BDMNU+UZMu03iG3jQoQsDh34anGUEdW
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
521fa830d91dc45ff0ef9fd02db624ca7a8fd75fd1696d8f24fcf5e03884ad12.elf linux x86