Behavioral task
behavioral1
Sample
510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b
Resource
ubuntu1804-amd64-en-20211208
0 signatures
150 seconds
General
-
Target
510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b
-
Size
98KB
-
MD5
3d371e091875ac8079f29082f573310c
-
SHA1
cff2d41f280d7ac4d58e52782da891c951d43aea
-
SHA256
510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b
-
SHA512
75b8fae64cba6e66caedb952ea2cc053b0f04ecefd0086fda714c2da4b329d18744d01fa573f981f154535f3113dae4ce63b8f7a9f9d311c74a407b1e118ae28
-
SSDEEP
3072:c3dKrphSeJs8vmuCI5Upfd9nHm4KKcXuGggYBK:en4JxCgUdHm4KKcXNggYBK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
510a64dc66dc113dbb3ac4661736ec80a9ff8d7b00011358313c9d49e5ac2c0b.elf linux x86