Behavioral task
behavioral1
Sample
4eb7edc53184d4dbf6bb435a60f21df1db8b7fa0935fe06ea86b551b23523955
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
4eb7edc53184d4dbf6bb435a60f21df1db8b7fa0935fe06ea86b551b23523955
-
Size
124KB
-
MD5
75c226f026264dfd631e5cdd796025c7
-
SHA1
3fbe1adb9c07f9c69221366141626ad9775af084
-
SHA256
4eb7edc53184d4dbf6bb435a60f21df1db8b7fa0935fe06ea86b551b23523955
-
SHA512
e7ad78f521c20e87f4e63b58962f2952bc4a3f91b6ca8390d4d4c8016ed1c29c5e6b98ecb04d963a51fdb55dc603e7db68cdf8a7f02b575d8291bd0129d29dab
-
SSDEEP
3072:EXY5gzI24XRFnDjmoRcQeFxfusim3ZQ1hzD9oY4giAGaJpP:EXY5BDXR9Jc5Om3ZQvzD9oY4giAGaJpP
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4eb7edc53184d4dbf6bb435a60f21df1db8b7fa0935fe06ea86b551b23523955.elf linux x86