Behavioral task
behavioral1
Sample
c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e
-
Size
122KB
-
MD5
450841d40d55add69aae9df2014e7acd
-
SHA1
616555a56e1fbd13f858d867add786dac2fff8e9
-
SHA256
c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e
-
SHA512
b9200b7ef1b9ddad4a0982bd37b916eaa70168bfb9a10668112af6fba5031f3a2a0c7c1046601a3933880b796bf2989805a9d2b6d24e6b87a53c2a55a0a61350
-
SSDEEP
3072:JmCiYwWSZkuYvg1+Ny0etJ8add9QzTs7zXUt4NKcXeGcgqGK:JdZowoSy0etJ8addQ4kt4NKcXdcgqGK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
c8077c010b6a9744973e2c865e4377d9ce42e6f49954e117a2967035f994964e.elf linux x86