Behavioral task
behavioral1
Sample
fa9d00979d0412e2430d1092422ce94a55af9bbdd1ce999ccb3d3c10c99cef43
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
fa9d00979d0412e2430d1092422ce94a55af9bbdd1ce999ccb3d3c10c99cef43
-
Size
97KB
-
MD5
61ac48135980c39c06b214f9385e334a
-
SHA1
54f453585c8ec7e7fbddd2a4df2f6fc6f788a050
-
SHA256
fa9d00979d0412e2430d1092422ce94a55af9bbdd1ce999ccb3d3c10c99cef43
-
SHA512
41ace94f295f69d20d9f5f58f3f4417022d0dbc09d3c5bcdbeeaf9de1b650c51ad4053809fba432c63f948709c0be29513758ad20acf922d823d2358445c35c9
-
SSDEEP
3072:BrvKKPQP39VjGWXFR+7pV7EGytVn5huWMbFXnf0OzTyoQQub:BHQP39VjGWXd9tVn5h7OFXnf0OzTyoQ7
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
fa9d00979d0412e2430d1092422ce94a55af9bbdd1ce999ccb3d3c10c99cef43.elf linux x86