Behavioral task
behavioral1
Sample
74d7703f63149de82ff6f6f584f23ffe694242014a12c922f959097bf8da70cc
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
74d7703f63149de82ff6f6f584f23ffe694242014a12c922f959097bf8da70cc
-
Size
139KB
-
MD5
05d61c9bbe5b4583df5b6667cfe592d3
-
SHA1
5b1efa9bc07977a2a389f17ee8eebf62c3daafff
-
SHA256
74d7703f63149de82ff6f6f584f23ffe694242014a12c922f959097bf8da70cc
-
SHA512
aec0727152e9195c2abe0b5ddd096136f90ba294ac23db7445300c212263bea232477e954256f7cb5f3737edbb752ab1cb5f53c7fc75d4e3aa06a3575d3a3a26
-
SSDEEP
3072:/wQUAsPbw0U2dCsJfx/x9/IZ8erIfJCBGEDHziH90PcZsatph1:3st7RRjIZ8eaCwE/iH90PcZsatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
74d7703f63149de82ff6f6f584f23ffe694242014a12c922f959097bf8da70cc.elf linux x86