Behavioral task
behavioral1
Sample
02a430a3f464e8552d2378057de521f4
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
02a430a3f464e8552d2378057de521f4
-
Size
97KB
-
MD5
02a430a3f464e8552d2378057de521f4
-
SHA1
1e585845aae32792fb11e655f34079866b92d417
-
SHA256
6abf7ac5c3741fafeffa1ffdf85004fcd2138b42a096f3b7ae2db41da0b54fd1
-
SHA512
c52f2631b682525afbce28d060e14b1d56de8a0a8bddcd529f17ebf3ccafdd1fe3010a00f3f62312f824954995eaa1f0db94b380090d8d982cf72253e0816f15
-
SSDEEP
3072:VK1z13U6HzHoXRtmTUhQogaEmmFVcqq0GnDZT:VK7DDeKlogaEmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
02a430a3f464e8552d2378057de521f4.elf linux x86