Behavioral task
behavioral1
Sample
cafb118d85819fe451f0e2c1fa529e40d53d48d7ca43c7b0ec627d15fa26279f
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
cafb118d85819fe451f0e2c1fa529e40d53d48d7ca43c7b0ec627d15fa26279f
-
Size
122KB
-
MD5
8f1cbb8937f8d513ffcafdbcf544de86
-
SHA1
28dcfe12f71bfbb7c57981bb45b409c8a939ad81
-
SHA256
cafb118d85819fe451f0e2c1fa529e40d53d48d7ca43c7b0ec627d15fa26279f
-
SHA512
2c78d54e8389fffdb2cebae09e7cc3227e1af64f8d3c4207fc76e2563b227eefaf962dab3dd5ecae464955100f44a0b843debfa916041f503df3f0f898b19814
-
SSDEEP
3072:lZj9Do+aP0YsQpZ+7EetJ8add9QzTsCzH1g4NKcXeGcgqGK:lZ/Qr+7EetJ8addQzH1g4NKcXdcgqGK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
cafb118d85819fe451f0e2c1fa529e40d53d48d7ca43c7b0ec627d15fa26279f.elf linux x86