Behavioral task
behavioral1
Sample
9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe
-
Size
126KB
-
MD5
94610e335af56420a268d2919d164081
-
SHA1
537b01a4dcd554a5718a41346f7edca1e642242c
-
SHA256
9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe
-
SHA512
11fdf4b43b89827ce21665d85861a569375a2b85985687cdb68032f5191d9efffe9f2dacacd1ccc378e383ace48c2c7c2d998f8262c18cf3026cc7153aebf88e
-
SSDEEP
3072:H+te3cWiXFrnS9OxaSetJ8add9QzTsUDTbDSFot47KcX6GcgqBK:X3gZu+aSetJ8addQbDn5t47KcXJcgqBK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
9f8760bdf62fe7edfc1f7da1848ef3cda1128f7476f63b089c07edc240c00ebe.elf linux x86