Behavioral task
behavioral1
Sample
4dcfd054e403d48ddab68f96882faf00cc3a1bc73ac66c14c3c1b5317d5d2f3c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
4dcfd054e403d48ddab68f96882faf00cc3a1bc73ac66c14c3c1b5317d5d2f3c
-
Size
89KB
-
MD5
f38555715a0efbeaa4425d34656f7e40
-
SHA1
610e3c3f33a09d547a2c8e9750746644d6e7373a
-
SHA256
4dcfd054e403d48ddab68f96882faf00cc3a1bc73ac66c14c3c1b5317d5d2f3c
-
SHA512
0612cc545b17e4dcf7ed940f4724f84d88fa8a7cca3787ea1f211482d0074b9129ca2be336362cee91b5954e3e9fa36ebc7869e09a737cc9284502348ada42f5
-
SSDEEP
1536:m3hDt30JOQlDZPoe0ZWNMDyIZuUdfwY33hp5hB+lJsEWshe0QzUzJYQ2Wk:QtZQlDZPo2CDyIZ9dfwUv5hBmWUe0QzR
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
4dcfd054e403d48ddab68f96882faf00cc3a1bc73ac66c14c3c1b5317d5d2f3c.elf linux x86