Behavioral task
behavioral1
Sample
85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c
-
Size
109KB
-
MD5
3a0c5cf7ef01e53645ee3f6931778314
-
SHA1
061ead5417575e5d81e9775e8444f9eb448515d6
-
SHA256
85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c
-
SHA512
2db87a219e913f3be92382500af62cb8d71813b440544d06b2824d2e236c3b015e0098125f0f8b5708ed7a5d7598c9e26230f7fe3009c3a0072876875d72277d
-
SSDEEP
3072:2G/PXUw9DCj1e5dLNgvXMbTpK9u9tcntmruOBmST0nYXbg1DE:/h9DCj1wdZgvO6u9I+uOBmST0nYXbg1g
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
85f1b84cf047c08ae1ecb9c72e7cbc03f8d7bb433560ae3324f737e54749045c.elf linux x86