Behavioral task
behavioral1
Sample
b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352
-
Size
99KB
-
MD5
70bfc9d880e86b04ef1e1311f8b343c0
-
SHA1
5376786824f2b8bce9a20cb032dfa15d63bc4ba7
-
SHA256
b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352
-
SHA512
88ba1e897f829b5d6bf06170fe24b474b1187f92e2ac42d59b00e09cab1c0802db791bed40ebc4ca2babe3e7de1e83e8dea4d7f1157b2fa1595644f5f5ee267a
-
SSDEEP
3072:OkH9VoT7QbMAf8vN5h7+zWXYy0Oz/FQQ6uN:OCsi8vN5h7+6XYy0Oz/FQQ6uN
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b21cd3833153f21cc268e39e0bb55ad993ad25a4e0d58a65b9d0025a07739352.elf linux x86