Behavioral task
behavioral1
Sample
580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2
Resource
ubuntu1804-amd64-en-20211208
ubuntu-18.04-amd64
0 signatures
150 seconds
General
-
Target
580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2
-
Size
116KB
-
MD5
b847ce1b8f35249bda3bb00d13ad80a1
-
SHA1
e80ddea9b41bdc2d88b1fedc694e744d93249320
-
SHA256
580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2
-
SHA512
a3257f5cb3adf0d527e63ac63345295aa9f0e3b6e1f5ced94bf59865b0ccbf1356b750d17cf89d1ed719074537f2010b5cd84e056078f2770ad949c0161e589b
-
SSDEEP
3072:zZdwUKUBV9+4fVTNv5j8setJ8au49QuTsiLKBn7otXBtcZkG7gyqc:UBo1N551etJ8au4lxSotXBtcZn7gyqc
Score
10/10
Malware Config
Signatures
-
Detect Mirai payload 1 IoCs
resource yara_rule sample family_mirai -
Detected Gafgyt variant 1 IoCs
resource yara_rule sample family_gafgyt -
Detected x86corona Mirai variant 1 IoCs
File resembles variant of the Mirai bot which was first seen in early 2020.
resource yara_rule sample family_mirai_x86corona -
Gafgyt family
-
Mirai family
-
Mirai_x86corona family
Files
-
580d5a3409925652a9b864d11ca0bbc1f5a67acd662f4104d37ad61e6321ecd2.elf linux x86