Behavioral task
behavioral1
Sample
9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63
-
Size
113KB
-
MD5
5512c7cd07c3ede2012f303bf89a16ad
-
SHA1
9c992055eacbbe9f7ed0849ac2a0d0a4491dd960
-
SHA256
9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63
-
SHA512
0efa746778416531bd5bdf611d66ced28ee73093db6ae7d715e1574dbc012709dfed2482de48e09d3de32c23cbfad4296bdf54d6a09a914eb2a3557fa42df082
-
SSDEEP
3072:lLQ5paFGq5PBSVjDW6kwh2LQ68E97JEXPk7fD162kzANTjsEmST0nYXbg1DE:l03+5PBSVjDW6zNu1EXPOfD16293sEmo
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
9e79a6fb491279ed7c8a96509e27a0a14629a2ac2917142a02a226049ee50e63.elf linux x86