Behavioral task
behavioral1
Sample
ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62
-
Size
75KB
-
MD5
4c6922ce2de3149f24403df2b92214af
-
SHA1
3f391436cb09a114d9ef9fd2f13d1bb78d7502a1
-
SHA256
ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62
-
SHA512
e03bb2abb2f61fab3d6d7f4d9d500672a580ac2b17d7a56d5339e2551b6f8e45590f3852ede7b69105617b7cf60a9e6f2642c936efa7b6b10d1eb9d4d3b6f51d
-
SSDEEP
1536:/ZPpN8UdU7UL8gcEX40f+66w+fDbD06O4QzIfCqVqLzKQyDmIJhyE3GVKbZV:/ZhN8UdU7UL8gcS40fV5+fDfP9zCTnxO
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
ecfc7795078283c07f8c41ecddacf178f474e470047d7e66fb447a26fb04be62.elf linux x86