Behavioral task
behavioral1
Sample
506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47
-
Size
116KB
-
MD5
de24b4e3738359189e8f0ceb65babcee
-
SHA1
4d53bbfebba4449ed5b6990698a785f9dfd08788
-
SHA256
506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47
-
SHA512
1c0c8176bc50707325694caf3d185b69e5f4e37591f410e7c0d195aafa9e2a972acccb71a696e4c37d28eaeb53dcc8d651ff2426eb55305b6960bf05c917ddf0
-
SSDEEP
3072:DDPQ/zYsolVIO9DG2etJ8au49QuTsd2og5+rYE3EgxstcZkG7gyqc:DcQVT9D9etJ8au4lm2gxstcZn7gyqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
506a8a9c786cc49f995e9f8ac921b9a7a876b49ad3d1c7d4388af0fb3463dd47.elf linux x86