Behavioral task
behavioral1
Sample
5123759d3a8deda1d77061fef4022fa6defa557ae7721285e07856f2cf663538
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5123759d3a8deda1d77061fef4022fa6defa557ae7721285e07856f2cf663538
-
Size
97KB
-
MD5
ed2ebac89272c982aae0c93c9f204ac3
-
SHA1
8b27291b950114e969c8f4e8de598bb55900eddf
-
SHA256
5123759d3a8deda1d77061fef4022fa6defa557ae7721285e07856f2cf663538
-
SHA512
9223d05af8224b8c4a3b785422a5876fa6369617f2e2bdf90da50372ab3caa635e698b1ef83c3bd97ae94adcbbcf52ed93c444a6334011e2f2a533bfbb3a5604
-
SSDEEP
3072:lXrKKPQP39VjGWXFR+7pV7EGytVd5h2W9bFXnf0OzTyoQQub:l3QP39VjGWXd9tVd5hDdFXnf0OzTyoQ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5123759d3a8deda1d77061fef4022fa6defa557ae7721285e07856f2cf663538.elf linux x86