Behavioral task
behavioral1
Sample
c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a
-
Size
101KB
-
MD5
05ff04ac2dad49a4d2b17fa019b9a416
-
SHA1
a5593c2f7d8c785ccac2e4bea888c929dc530224
-
SHA256
c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a
-
SHA512
48e65400df880661623997a9bd5757b66d18839e76bfd44df651ce3b066df6f422ffcc32d1f7ade48ccf70c3fe7812c70bfe129612ff1527b374009ea0ea55d8
-
SSDEEP
3072:GK67bD77b6lVeSm0+HsopApASmB8VchtSgDj4:GVDR0+Hs2pSmB8VchtSgDj4
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c3635000fb68a2d3fbb180849e5675b9cf54a4819aa113b311ae76357f8f9e6a.elf linux x86