Behavioral task
behavioral1
Sample
4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8
-
Size
134KB
-
MD5
4430993e9e61108925565551d99da046
-
SHA1
ca963dba6edeff4c1e12bcacb379c4ea0c60cceb
-
SHA256
4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8
-
SHA512
c44e111143915a01721b01eac9bf6f0125df0aefc71e5a4a6c4d87a6340ade4693941460f44dc9663c2512c02e3a0d63e1afea10c86d53ac533d3202be4bd2d8
-
SSDEEP
3072:GbA8hDg6mW4JM4QqukcT2OOSoA7uMmq0ichYyeaK0FU:G08VvmWPOSoeuMmq0ichYyeaK0FU
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4ff92850be6b48021c6478879a88f153d25dc9473e52db2e56938d0fa1728aa8.elf linux x86