Behavioral task
behavioral1
Sample
i686
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
i686
-
Size
277KB
-
MD5
c5903c5d6db926ae679250cf783207be
-
SHA1
fe365aec3450af02b50609ae448d5159ce87c234
-
SHA256
0ba46691b022e64889da216e0fb500a89cd440ecc1676a1530c4e16a433b6f2f
-
SHA512
2a0d5d6a76bdbb73a250e3a954bb41827a9c0b8a02c59f6c891341f783be4afac09ae171372dc2686fea2ae0350e3fa1025e84403378bfac7c5e5b653fa9efcf
-
SSDEEP
6144:IMNfNu0FAzYBNMXdZCSpn0UpQKqUgAZ08MjUlQQmmFVcqq0GnDZT:NNfNu/Mj2QQmmFVcqq0GnDZT
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
i686.elf linux x86