Behavioral task
behavioral1
Sample
5a7ebc364f549010626e9fd953ca2ff88744aab94c268a26b0af40292f15d09d
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
5a7ebc364f549010626e9fd953ca2ff88744aab94c268a26b0af40292f15d09d
-
Size
89KB
-
MD5
c8c646c139fdc88c9f893e9548be339a
-
SHA1
5dfb20fe20f643d39c39ec69aafdf11c12f34786
-
SHA256
5a7ebc364f549010626e9fd953ca2ff88744aab94c268a26b0af40292f15d09d
-
SHA512
9d9bcf58c0ee9858743b53c6bde348b8f467aed57d1edd532b0e7bf215f0b73af574dfed3691b54d229da0b29178102159ee3a3f09ce52b29b676c7d17ba56ce
-
SSDEEP
1536:2BEao37JOl3Y9SpgwKWwCwyIZWDq1S3u8t5hBM4JseWshe0QzUzJYQ2Wk:6oAl3YEpjdwyIZWDq1ja5hBpWUe0QzUy
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
5a7ebc364f549010626e9fd953ca2ff88744aab94c268a26b0af40292f15d09d.elf linux x86