Behavioral task
behavioral1
Sample
50a049390abfeb83b0dff2a2004a148507fa776d4472a894969ca22401b5044a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
50a049390abfeb83b0dff2a2004a148507fa776d4472a894969ca22401b5044a
-
Size
148KB
-
MD5
482fcc2197ac97e2762bba9d54cca8c9
-
SHA1
f67b1f7ddb9ad381dfdd39fd9b26fdd67c8124e5
-
SHA256
50a049390abfeb83b0dff2a2004a148507fa776d4472a894969ca22401b5044a
-
SHA512
f46c25bf66cd0b31573f2bfd66ad201ac336e3459acc7b6a4f94f82615c00df14ad02522ba230c7fb90c829be25773d7412bed3037bea583cb2403b4946116d4
-
SSDEEP
3072:HW5f5GpNUTle11pZkpJqR8OlVGZPlhwnvpRwWriH90PfNatph1:meaGECRDlEdCnJiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
50a049390abfeb83b0dff2a2004a148507fa776d4472a894969ca22401b5044a.elf linux x86