Behavioral task
behavioral1
Sample
b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d
-
Size
85KB
-
MD5
a72e2c0dc019c491352b017e71b30083
-
SHA1
fa2bbba81f802d1d96acf8090a03eabdd9c2916f
-
SHA256
b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d
-
SHA512
e7e61ddb04a7801012e46140f9836db36a9336c5eb37cb473bc1e77b25dc41c8a0bd94eff1590711542f64af3b0850f338b568bd5e27aa306bd82159015d2313
-
SSDEEP
1536:f4rEUHe3QUzEPuTs5loupkqBYlww9k4cgtAPH15hCosG7she0QzUzJYQ2Wk:wrTLUwmYwup0wak4rg5hCe7Ue0QzUFYV
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
b6e93ee4a2858c6a8e6fb8b0cb9cd98e2b5a50d7cfaa1fa604ac05ba5cc2f18d.elf linux x86