Behavioral task
behavioral1
Sample
4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e
-
Size
113KB
-
MD5
dfceb139ba6e426ac973d00a5d0bfd8b
-
SHA1
2e51637894a1d961abdf3db8cadaad3ad8a57815
-
SHA256
4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e
-
SHA512
700a89dafce1739e69e02e67165ba68bf5974bac4d2e681c3e4147edef9c3c2c5775cddd8d2fb789bfac1b0ceecf2b154bde4e817bb4744e47a9fed84a720777
-
SSDEEP
3072:j98HdmPaFGq5PBSVjDW6iw7qLQ68E97JEXPk7fD162zVnt7jsEmST0nYXbg1DE:juH8+5PBSVjDW6XNu1EXPOfD162P/sEL
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4f7633c0dea4ca026f6a844e1a87138563643fd449f520d3a00147b28e46801e.elf linux x86