Behavioral task
behavioral1
Sample
edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46
-
Size
98KB
-
MD5
ba029fbda3883d69aee9ce5c98a5212f
-
SHA1
ee8e943873d3590b9a7dc499e27df16e130c0a41
-
SHA256
edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46
-
SHA512
808d651c456b71b15daa055150485306f0fa983dd3f5b148e98f2bf4711cfbd029df662ea9f2af4441e552a910fab29bf3e982aedc71dd43f22013e8ac8c6c82
-
SSDEEP
3072:zWnTrUjUcULzGEZKZmyvM+Gs9G52RDc8DBK4IYj5hMS7:wH6XsKEaEt72RDdDBK4IYj5hMS7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
edc09066e6e71121e130bc7a098cd8df6e194e1063fb6c98adf67da8ec3d8f46.elf linux x86