Behavioral task
behavioral1
Sample
85ef0cf1c6a088c463d6f22a61d6d33880a5f28056d8d8dfb77550f1d4a63baf
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
1 signatures
150 seconds
General
-
Target
85ef0cf1c6a088c463d6f22a61d6d33880a5f28056d8d8dfb77550f1d4a63baf
-
Size
93KB
-
MD5
29b232d4af7ffc5014ccbfddc80de0d6
-
SHA1
6abfdbe54c3fcd5129134c585c9bcd4b3e63af61
-
SHA256
85ef0cf1c6a088c463d6f22a61d6d33880a5f28056d8d8dfb77550f1d4a63baf
-
SHA512
4a568e7f75bcd192b2f184fc0c2bc85b056d85ef07b0c6aa29e806694619b765e0863c63147e09173d2ee214960a74fe8949a52f76ce2229b36be7244e4dcb81
-
SSDEEP
1536:yY39lMYa+n63KAPNKyWQ6nRlEwscCnMCYeZALe5hYaxrlLbPM37K8PN2UrYe:J9Ja+ndMNetnRpsJMCYeYe5hY8bE37KQ
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
85ef0cf1c6a088c463d6f22a61d6d33880a5f28056d8d8dfb77550f1d4a63baf.elf linux x86