Behavioral task
behavioral1
Sample
4f9d3bc9dbd8c26d1587b844646706652791aad49f5072cfbd054a90bbe32258
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f9d3bc9dbd8c26d1587b844646706652791aad49f5072cfbd054a90bbe32258
-
Size
89KB
-
MD5
53985c9604a603391cab9c3de9328eea
-
SHA1
bf4c37cd9f6aa92eaeab070d0e5408b6689e42f3
-
SHA256
4f9d3bc9dbd8c26d1587b844646706652791aad49f5072cfbd054a90bbe32258
-
SHA512
fe16065866f463cfd91286498a192f58c91b1a88a1c44abf3d74b3c936e2f85a0d9a1677a07cde63132b45a2b148b8fbdf05bd6a1e2b19694f9be39cf388f213
-
SSDEEP
1536:2JcSA3zJO93RceGQwqWQC1yIZ2DN1d3OoJ5hBPrJs6Wshe0QzUzJYQ2Wk:CAI93RceGT91yIZ2DN1Qe5hBlWUe0QzR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4f9d3bc9dbd8c26d1587b844646706652791aad49f5072cfbd054a90bbe32258.elf linux x86