Behavioral task
behavioral1
Sample
50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7
-
Size
119KB
-
MD5
75407d8bf754e7eaca0b62b584c7ac14
-
SHA1
c7cacca9aca1ef560bde716751913cb1d8e14f05
-
SHA256
50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7
-
SHA512
12fb67e173c859ce1055b65ae7d2794a15d1b524255f51aff612a9aef8e2a555cfa15f19599880797662995212928c4815fbba3437a29db513540d2d72ff291a
-
SSDEEP
3072:V4DmGzbEUWPT+7XdpgcTl9NTTVztrRt1KFGwcz0Y:dGc9TivZh99ptrRt1Kwwcz0Y
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
50454a0bc24c483934fae7357d8f7966ef06e65fb56fb2e2180b709dc8ee83b7.elf linux x86