Behavioral task
behavioral1
Sample
59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
2 signatures
150 seconds
General
-
Target
59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c
-
Size
141KB
-
MD5
caacd0e27bf93dd7f9bbeab72008dd2d
-
SHA1
32254c10c6b4cdd20d7637a0b109749fccd55e98
-
SHA256
59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c
-
SHA512
46c9aba7b6ac2bae1d0882a7b367b3e64f8247fc0ca0f26baefb0bfb14821d8a6205fd083e89ee4900674bc981560f9b562b10198a504e2921d62277bdc52c14
-
SSDEEP
3072:jWuDd5lTa3LXmi//5ABOzcU28Ca6jDF0bLD7da4giJHaEFk:jWuDd5QW/C4j50/D7da4giJHaEFk
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
59f682791bce6ee3f8c546acb81a4b5bbb9a1d648bf426c5ba7f74785044893c.elf linux x86