Behavioral task
behavioral1
Sample
d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff
-
Size
87KB
-
MD5
92c22c27ea8649b7222c6f561cb50d46
-
SHA1
580422d4810226a835d9a6d73b5a9a96f45bc142
-
SHA256
d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff
-
SHA512
947286128d7d6221e49bb58b79fd36a7e47f8e234248fa9173395062ec0516a04b56037128be353f8272d562b776d79c661eada247316fef3ae0154203ca422a
-
SSDEEP
1536:SYxU08RDUi8MXmM89Tvnfhd0hsQTkJluFvw5LaSPsLOnPGJUkft3LR52wm:SYIR3WPdvnJdapAJQwxacsLOnOJUkfxq
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Detects Kaiten/Tsunami Payload 1 IoCs
resource yara_rule sample family_kaiten2 -
Detects Kaiten/Tsunami payload 1 IoCs
resource yara_rule sample family_kaiten -
Kaiten family
-
Mirai family
-
Mirai_x86corona family
Files
-
d67eedf860bdd92cb6920a5381e82fe2c0c07e3a0959728b7123055fd22274ff.elf linux x86