Behavioral task
behavioral1
Sample
59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7
-
Size
116KB
-
MD5
c55c55bd7eef002b847e5cf97d593113
-
SHA1
a9479e933fec9409669d8629f299bd870a0376f7
-
SHA256
59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7
-
SHA512
5c10563eeb32c1a1684230aa1d72dcb52093b58f6fec2cadadd39738ac39cb2fc0e0189fe2359feb9007f2801846c1dfdf1e7f5e36b3f2f9e9fdf256f7407d89
-
SSDEEP
3072:lGR1eOtJ8AAWS8oJMetJ8au49QuTsJk0nJ3VgXBtcZkG7gyqc:loyxIoJMetJ8au4lak0JlgXBtcZn7gyv
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
Processes:
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
Processes:
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
Processes:
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
59e4d529e295917a6b409c3c469249f90d474ba6e733fef8e6adc320d17efdd7.elf linux x86