Behavioral task
behavioral1
Sample
4f8bc106728691a738e1191c9782b1de5521547e2dc6772ec2b3821f16225cfb
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f8bc106728691a738e1191c9782b1de5521547e2dc6772ec2b3821f16225cfb
-
Size
86KB
-
MD5
bc8f713dab8eaaf605802349de3e60fe
-
SHA1
882f4f1e2052157c372156ccb10f42be9b81c12b
-
SHA256
4f8bc106728691a738e1191c9782b1de5521547e2dc6772ec2b3821f16225cfb
-
SHA512
9c2ebfcaba0762a93ec61dd468ebbc7613e5a930a2eb1482143d5bd2d954a3995f3ae9a468f88c6985ff3c550536cd99a6f2dc0f890c78a28afcc74327df8663
-
SSDEEP
1536:V44wE1Icbs+UzVV13Kp1FDdEloVXlRI1reHAWh5hinq+7she0QzUzJYQ2Wk:VVwjgUpD3K9DdUoBXItev5hiN7Ue0QzR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4f8bc106728691a738e1191c9782b1de5521547e2dc6772ec2b3821f16225cfb.elf linux x86