Behavioral task
behavioral1
Sample
519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6
-
Size
148KB
-
MD5
57105a071448eceeaff91782664a9bf8
-
SHA1
6a486d409cd68661d5acc6d46fe07c1241dc1469
-
SHA256
519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6
-
SHA512
bbf548539bc2219748bef79da6cefd2c56cbf7448ffeb10e453ea302f8886c714201bacf193137eef5b4d2570fd77d812744cb58f631441738c0bb4a38a24302
-
SSDEEP
3072:H6pvTqTmdNUfle11pZkpJqRGOlVGiPlh2vpupRwWriH90PfNatph1:qTqYmGECRFlrdgvpSiH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
519456b137816085734728db204f6a4201ded45472ebf443c0476814eacb7fd6.elf linux x86