Behavioral task
behavioral1
Sample
587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2
-
Size
153KB
-
MD5
702fed89086b45652ed3326466954234
-
SHA1
3902f89134234c91172796cacac45f0c9d94df6c
-
SHA256
587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2
-
SHA512
bb4f84cedabeb90de61ffe9fb24ebcddcc5b1ab26e718fff0d2f8436b1611f68b9019dfd3d84c6c3a1706c53f6e7c3b94450ebffc2f00ee236839dd6ca888a14
-
SSDEEP
3072:dP+JoERejZrQX1qNpd+Me7wCUh2OlV51KHbxhY/XH90PfNatph1:deoERKNe0CUh1lVKHNhkXH90PfNatph1
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
587f30d5d25d0fd0827ea54e9b35a4347f7a90b8cb19bdfe6f4c90ccba9f15b2.elf linux x86