Behavioral task
behavioral1
Sample
58de18fc3757ae06d2f9dc7a5646fb6c93ce5468256873b3584498b5fba395ad
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
58de18fc3757ae06d2f9dc7a5646fb6c93ce5468256873b3584498b5fba395ad
-
Size
93KB
-
MD5
3cbc12463b20be156e98a6b67e7f70b3
-
SHA1
2213c10ae2df5b38a468ac48c464d14da8dc4366
-
SHA256
58de18fc3757ae06d2f9dc7a5646fb6c93ce5468256873b3584498b5fba395ad
-
SHA512
c0f3fce40727d42c89c48594748185c8893823b14756772a7fe14b8272af98d19d18aeccbfe218145bcefedf6dcd33776670813c294ae579208e9dd25b8ec6ca
-
SSDEEP
1536:un/HVRF8/E1ULg0HpRw3at21786GefnQ340z3fmN+JFp+7ZmmiIVcqqzIGnOZT:un/HV8iUU0HpR2146ffnQ3bk9lmmFVcE
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
58de18fc3757ae06d2f9dc7a5646fb6c93ce5468256873b3584498b5fba395ad.elf linux x86