Behavioral task
behavioral1
Sample
871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
-
Size
124KB
-
MD5
9a8f73f34d7068422cb22483740ae0e4
-
SHA1
ae81be318be96b511c2efc84e2e04659039ef793
-
SHA256
871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289
-
SHA512
ce86abbc596d5370b68e75e6e8afe2f77cba62911ace9f4b9f27760c7aaad475a98a71b4d358d3810d748ebb012cb329df4890b7d66044a650e5c3dacdfafeae
-
SSDEEP
3072:DbU2LXjrhWWR45Rlj9ksetJ8add9QzTs9mTuLxJRt4sKcXgGcgqBK:P/qDj9TetJ8addQqmTuFt4sKcXTcgqBK
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
871c836d030252c01a853996c8b1be1aa122b55f6dd5280dc469c15be9d97289.elf linux x86