Behavioral task
behavioral1
Sample
4f0005dbecb2f3e7737af9d91651a8f5b356f13d6f4c1d56abeb4e4d1050ad98
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4f0005dbecb2f3e7737af9d91651a8f5b356f13d6f4c1d56abeb4e4d1050ad98
-
Size
89KB
-
MD5
dba27351052d2bde491708e7abd38c73
-
SHA1
a12296ec1eb874afa9a61b68003a935cadcb4adb
-
SHA256
4f0005dbecb2f3e7737af9d91651a8f5b356f13d6f4c1d56abeb4e4d1050ad98
-
SHA512
fc3b3d45bbc711fc030398a5be4618eafebc7dcdfb8a67fba2abea6aefb9711f25fef12832b78fc5b9560d02e01de7ab08cfcce7ad102b6e26061f16e0ec5adb
-
SSDEEP
1536:2bcSA3zJO93RceGQwqWQC1yIZ2DN1d3OoU5hBayrJsSWshe0QzUzJYQ2Wk:kAI93RceGT91yIZ2DN1QL5hBaCWUe0Ql
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4f0005dbecb2f3e7737af9d91651a8f5b356f13d6f4c1d56abeb4e4d1050ad98.elf linux x86