Behavioral task
behavioral1
Sample
4ddbbb3edb968a1efe73d4ad9479ef5dcdf6571dde3305ee5dc129aec9c34657
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4ddbbb3edb968a1efe73d4ad9479ef5dcdf6571dde3305ee5dc129aec9c34657
-
Size
89KB
-
MD5
1320c28724e8850bd5d6239a13153acd
-
SHA1
cd4b8d5557701b279a8dcc7340fb6a11dfbc87a6
-
SHA256
4ddbbb3edb968a1efe73d4ad9479ef5dcdf6571dde3305ee5dc129aec9c34657
-
SHA512
a2c1ca175a8913d58e61036d10c31fa0ab479ffb55a8a29c7fa14b6681d4723285730eaaf36cc468f0d730bd93d9f9ec00388c1628d1faf5e7a39ae379bcdd8d
-
SSDEEP
1536:2JcSA3zJO93RceGQwqWQC1yIZ2DN1d3Oo/5hBPrJs6Wshe0QzUzJYQ2Wk:CAI93RceGT91yIZ2DN1QU5hBlWUe0QzR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4ddbbb3edb968a1efe73d4ad9479ef5dcdf6571dde3305ee5dc129aec9c34657.elf linux x86